[ Intrusion Exploit Shell System ]
[ Function mail() ] : [ ON ]
[ Function putenv() ] : [ ON ]

DIR: //usr/lib64/ruby / [ GO Home ]



Command BYPASS
Command BIASA
Create Folder
Create File

Item Name
Size
Date
Permissions
View
Delete
Rename
. 4096 2024-07-13 02:13:38 0755
.. 65536 2024-09-18 02:13:34 0555
bigdecimal.so 82720 2024-07-11 14:47:51 0755
cgi 4096 2024-07-13 02:13:37 0755
continuation.so 7584 2024-07-11 14:47:51 0755
coverage.so 16032 2024-07-11 14:47:51 0755
date_core.so 212288 2024-07-11 14:47:51 0755
dbm.so 24416 2024-07-11 14:47:51 0755
digest 4096 2024-07-13 02:13:37 0755
digest.so 20272 2024-07-11 14:47:51 0755
enc 4096 2024-07-13 02:13:37 0755
etc.so 28456 2024-07-11 14:47:51 0755
fcntl.so 7576 2024-07-11 14:47:51 0755
fiber.so 7480 2024-07-11 14:47:51 0755
fiddle.so 41544 2024-07-11 14:47:51 0755
gdbm.so 28656 2024-07-11 14:47:51 0755
io 4096 2024-07-13 02:13:38 0755
json 4096 2024-07-11 14:47:47 0755
nkf.so 318616 2024-07-11 14:47:51 0755
objspace.so 45736 2024-07-11 14:47:51 0755
openssl.so 385096 2024-07-11 14:47:51 0755
pathname.so 33000 2024-07-11 14:47:51 0755
psych.so 33120 2024-07-11 14:47:51 0755
pty.so 20080 2024-07-11 14:47:51 0755
racc 4096 2024-07-13 02:13:37 0755
rbconfig 4096 2024-07-13 02:13:37 0755
rbconfig.rb 14842 2024-07-11 14:46:52 0644
readline.so 37064 2024-07-11 14:47:51 0755
ripper.so 222064 2024-07-11 14:47:51 0755
sdbm.so 32776 2024-07-11 14:47:51 0755
socket.so 191048 2024-07-11 14:47:51 0755
stringio.so 37048 2024-07-11 14:47:51 0755
strscan.so 28848 2024-07-11 14:47:51 0755
syslog.so 16208 2024-07-11 14:47:51 0755
vendor_ruby 4096 2024-07-11 14:47:47 0755
zlib.so 66736 2024-07-11 14:47:51 0755