Linux cyberpanel 5.15.0-156-generic #166-Ubuntu SMP Sat Aug 9 00:02:46 UTC 2025 x86_64
LiteSpeed
: 160.191.175.3 | : 216.73.216.114
Cant Read [ /etc/named.conf ]
8.2.29
aodai6801
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
python3 /
dist-packages /
wadllib /
tests /
data /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
__init__.py
0
B
-rw-r--r--
data-types-wadl.xml
936
B
-rw-r--r--
launchpad-wadl.xml
182.33
KB
-rw-r--r--
links-wadl.xml
1
KB
-rw-r--r--
multipart-binary-wadl.xml
1.11
KB
-rw-r--r--
options-wadl.xml
890
B
-rw-r--r--
person-limi.json
2.34
KB
-rw-r--r--
personset-page2.json
12.54
KB
-rw-r--r--
personset.json
12.72
KB
-rw-r--r--
root.json
136
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : multipart-binary-wadl.xml
<?xml version="1.0"?> <application xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://research.sun.com/wadl/2006/10" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xsi:schemaLocation="http://research.sun.com/wadl/2006/10/wadl.xsd"> <resources base="http://www.example.com/"> <resource path="" type="#service-root"/> </resources> <resource_type id="service-root"> <method name="POST" id="service-root-operation"> <request> <representation mediaType="multipart/form-data"> <param style="plain" name="text_field" required="true" /> <param style="plain" name="optional_field" /> <param style="plain" name="binary_field" type="binary" required="true" /> </representation> </request> </method> <method name="POST" id="mystery-operation"> <request> <representation mediaType="text/unknown"> <param style="plain" name="field" required="true" /> </representation> </request> </method> </resource_type> </application>
Close