🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/589181.klas4s23.mid-ica.nl/public_html/phpmyadmin/vendor/symfony/dependency-injection

📁 ..
📄 Alias.php [view]
📁 Argument
📁 Attribute
📄 CHANGELOG.md [view]
📄 ChildDefinition.php [view]
📁 Compiler
📁 Config
📄 Container.php [view]
📄 ContainerAwareInterface.php [view]
📄 ContainerAwareTrait.php [view]
📄 ContainerBuilder.php [view]
📄 ContainerInterface.php [view]
📄 Definition.php [view]
📁 Dumper
📄 EnvVarLoaderInterface.php [view]
📄 EnvVarProcessor.php [view]
📄 EnvVarProcessorInterface.php [view]
📁 Exception
📄 ExpressionLanguage.php [view]
📄 ExpressionLanguageProvider.php [view]
📁 Extension
📄 LICENSE [view]
📁 LazyProxy
📁 Loader
📄 Parameter.php [view]
📁 ParameterBag
📄 README.md [view]
📄 Reference.php [view]
📄 ReverseContainer.php [view]
📄 ServiceLocator.php [view]
📄 TaggedContainerInterface.php [view]
📄 TypedReference.php [view]
📄 Variable.php [view]
📄 composer.json [view]

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!