Linux ubuntu22 5.15.0-133-generic #144-Ubuntu SMP Fri Feb 7 20:47:38 UTC 2025 x86_64
nginx/1.18.0
: 128.199.27.159 | : 216.73.216.2
Cant Read [ /etc/named.conf ]
8.1.31
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
html /
sms-core-ui-code /
app /
[ HOME SHELL ]
Name
Size
Permission
Action
assets
[ DIR ]
drwxrwxr-x
components
[ DIR ]
drwxrwxr-x
config
[ DIR ]
drwxrwxr-x
containers
[ DIR ]
drwxrwxr-x
helpers
[ DIR ]
drwxrwxr-x
images
[ DIR ]
drwxrwxr-x
service
[ DIR ]
drwxrwxr-x
styles
[ DIR ]
drwxrwxr-x
translations
[ DIR ]
drwxrwxr-x
types
[ DIR ]
drwxrwxr-x
ui
[ DIR ]
drwxrwxr-x
utils
[ DIR ]
drwxrwxr-x
.htaccess
1.75
KB
-rwxrwxr-x
.nginx.conf
3.21
KB
-rwxrwxr-x
app.tsx
4.28
KB
-rwxrwxr-x
configureStore.ts
2.21
KB
-rwxrwxr-x
global-styles.ts
658
B
-rwxrwxr-x
globals.d.tsx
214
B
-rwxrwxr-x
i18n.ts
1.26
KB
-rwxrwxr-x
index.html
1.26
KB
-rwxrwxr-x
locales.ts
95
B
-rwxrwxr-x
reducers.ts
9.12
KB
-rwxrwxr-x
saga.tsx
7.17
KB
-rwxrwxr-x
utils.d.ts
74
B
-rwxrwxr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : .nginx.conf
## # Put this file in /etc/nginx/conf.d folder and make sure # you have a line 'include /etc/nginx/conf.d/*.conf;' # in your main nginx configuration file ## ## # Redirect to the same URL with https:// ## server { listen 80; # Type your domain name below server_name example.com; return 301 https://$server_name$request_uri; } ## # HTTPS configurations ## server { listen 443 ssl; # Type your domain name below server_name example.com; # Configure the Certificate and Key you got from your CA (e.g. Lets Encrypt) ssl_certificate /path/to/certificate.crt; ssl_certificate_key /path/to/server.key; ssl_session_timeout 1d; ssl_session_cache shared:SSL:50m; ssl_session_tickets off; # Only use TLS v1.2 as Transport Security Protocol ssl_protocols TLSv1.2; # Only use ciphersuites that are considered modern and secure by Mozilla ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256'; # Do not let attackers downgrade the ciphersuites in Client Hello # Always use server-side offered ciphersuites ssl_prefer_server_ciphers on; # HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months) add_header Strict-Transport-Security max-age=15768000; # Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits # Uncomment if you want to use your own Diffie-Hellman parameter, which can be generated with: openssl ecparam -genkey -out dhparam.pem -name prime256v1 # See https://wiki.mozilla.org/Security/Server_Side_TLS#DHE_handshake_and_dhparam # ssl_dhparam /path/to/dhparam.pem; ## OCSP Configuration START # If you want to provide OCSP Stapling, you can uncomment the following lines # See https://www.digitalocean.com/community/tutorials/how-to-configure-ocsp-stapling-on-apache-and-nginx for more infos about OCSP and its use case # fetch OCSP records from URL in ssl_certificate and cache them #ssl_stapling on; #ssl_stapling_verify on; # verify chain of trust of OCSP response using Root CA and Intermediate certs (you will get this file from your CA) #ssl_trusted_certificate /path/to/root_CA_cert_plus_intermediates; ## OCSP Configuration END # To let nginx use its own DNS Resolver # resolver <IP DNS resolver>; # Set path root /var/www/; # Always serve index.html for any request location / { try_files $uri /index.html; } # Do not cache sw.js, required for offline-first updates. location /sw.js { add_header Cache-Control "no-cache"; proxy_cache_bypass $http_pragma; proxy_cache_revalidate on; expires off; access_log off; } ## # If you want to use Node/Rails/etc. API server # on the same port (443) config Nginx as a reverse proxy. # For security reasons use a firewall like ufw in Ubuntu # and deny port 3000/tcp. ## # location /api/ { # # proxy_pass http://localhost:3000; # proxy_http_version 1.1; # proxy_set_header X-Forwarded-Proto https; # proxy_set_header Upgrade $http_upgrade; # proxy_set_header Connection 'upgrade'; # proxy_set_header Host $host; # proxy_cache_bypass $http_upgrade; # # } }
Close