🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/585455.klas4s23.mid-ica.nl/public_html/l2-pro-2-een-game-in-javascript-Epolleke/Gamecraft/.git/objects/16

📁 ..
📄 2a6246c0d47aad04b5a66f1750190ff492b2eb [view]
📄 835c0e0bfcafc0ac278e1eb720474b4fb3f7b8 [view]
📄 8ba9c9d5d41c08a160ea228476a8a137c1b83a [view]
📄 9d1dfe1d05dc22791e0ca9154e4b4d72c95491 [view]
📄 9f2ebd8703ef81469762e0941abe27e04d83f5 [view]
📄 aafba892d50aa7e3c25339b43ce1163235049c [view]

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!