🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/585455.klas4s23.mid-ica.nl/public_html/l2-pro-2-een-game-in-javascript-Epolleke/Gamecraft/.git/objects/40

📁 ..
📄 17e6331d027dbea8f879e306222c757defa4e2 [view]
📄 1c9ebc108703cf7ac9ead611798a20b88a12ee [view]
📄 8f5ae866eb5afd03a3ee1c58caf0e02f23df2f [view]
📄 9cc5ed785d8947d316edc6e2788937080ab203 [view]
📄 b39353a3a710362db420d25c861237d05139f3 [view]
📄 baffc6f063ca965b7b3d8a3c57e2099ae9cadd [view]
📄 d6c4837b63285199cfcc458af54b18909cf4d6 [view]
📄 e3cec98b35d9e8c1c8256e1b0f81cf9a07d932 [view]

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!