🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/589045.klas4s23.mid-ica.nl/public_html/gamecraft/.git/objects

📁 ..
📁 03
📁 06
📁 09
📁 0b
📁 0e
📁 0f
📁 12
📁 15
📁 16
📁 1b
📁 1d
📁 21
📁 22
📁 26
📁 2a
📁 36
📁 37
📁 39
📁 46
📁 52
📁 5b
📁 66
📁 68
📁 71
📁 79
📁 7c
📁 82
📁 89
📁 8e
📁 92
📁 95
📁 9a
📁 a0
📁 ac
📁 b4
📁 c1
📁 c3
📁 c8
📁 cd
📁 d1
📁 d6
📁 d7
📁 d8
📁 db
📁 de
📁 e7
📁 ea
📁 ee
📁 ef
📁 f4
📁 f5
📁 fb
📁 fe
📁 info
📁 pack

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!