[ Intrusion Exploit Shell System ]
[ Function mail() ] : [ ON ]
[ Function putenv() ] : [ ON ]

DIR: //var/www/html/phpmyadmin/vendor/paragonie/sodium_compat/src/Core32 / [ GO Home ]



Command BYPASS
Command BIASA
Create Folder
Create File

Item Name
Size
Date
Permissions
View
Delete
Rename
. 4096 2022-05-11 00:42:44 0755
.. 4096 2022-05-11 00:42:44 0755
BLAKE2b.php 22324 2022-05-11 00:42:44 0644
ChaCha20 4096 2022-05-11 00:42:44 0755
ChaCha20.php 14511 2022-05-11 00:42:44 0644
Curve25519 4096 2022-05-11 00:42:44 0755
Curve25519.php 132974 2022-05-11 00:42:44 0644
Ed25519.php 15618 2022-05-11 00:42:44 0644
HChaCha20.php 5297 2022-05-11 00:42:44 0644
HSalsa20.php 6941 2022-05-11 00:42:44 0644
Int32.php 24580 2022-05-11 00:42:44 0644
Int64.php 31172 2022-05-11 00:42:44 0644
Poly1305 4096 2022-05-11 00:42:44 0755
Poly1305.php 1586 2022-05-11 00:42:44 0644
Salsa20.php 11506 2022-05-11 00:42:44 0644
SecretStream 4096 2022-05-11 00:42:44 0755
SipHash.php 6613 2022-05-11 00:42:44 0644
Util.php 209 2022-05-11 00:42:44 0644
X25519.php 11042 2022-05-11 00:42:44 0644
XChaCha20.php 2454 2022-05-11 00:42:44 0644
XSalsa20.php 1379 2022-05-11 00:42:44 0644