🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/586246.klas4s23.mid-ica.nl/public_html/l3-pro-3-ergowijzer-logiccoders/.git/objects/4c

📁 ..
📄 4c4dfc3cf71938691453e9f35dc4e055cd333a [view]
📄 664890c530e2805053a8d73da4f9602147e5ff [view]
📄 7c9e8eb3114faf88dc4e6843a85cce63a395fe [view]
📄 8a5a8e38f8f52033d52085c93eabf93786cbb4 [view]
📄 9a0de8d5c2ad3936e18c574a4037e7e74c3699 [view]
📄 cd52cd4beb8cc9922aded14838c43881b5a0e3 [view]

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!