FX Shell Backdoor
Home
Tools
Mass Delete
Mass Deface
Symlink
About
Website : vivehg.com
Ip Address : 172.31.2.149
Port : 443
Kernel : Linux 52-72-122-155.cprapid.com 5.15.0-1084-aws #91~20.04.1-Ubuntu SMP Fri May 2 06:59:36 UTC 2025 x86_64
Protokol : HTTP/1.1
Save Data :
Koneksi :
Server : Apache
Root : /home/vivehg/public_html
G-Interface : CGI/1.1
R-Method : GET
Browser : Lainnya
Version Shell : 1.0 (Release candidate)
Author : FierzaXploit/Mr.MF33
Type
Name
options
PATH :
/
usr
/
share
/
ModemManager
/
fcc-unlock.available.d
/
Upload
Buat File
Buat Folder
Buat Ransomweb
#!/bin/bash # SPDX-License-Identifier: CC0-1.0 # 2021 Aleksander Morgado <aleksander@aleksander.es> # # Sierra Wireless FCC unlock mechanism # HP 820 G1 (EM7355), 03f0:4e1d # Dell DW5570 (MC8805), 413c:81a3 # Dell DW5808 (MC7355), 413c:81a8 # Lenovo-shipped EM7455, 1199:9079 # # require program name and at least 2 arguments [ $# -lt 2 ] && exit 1 # first argument is DBus path, not needed here shift # second and next arguments are control port names for PORT in "$@"; do # match port name [[ $PORT == *"cdc-wdm"* ]] && { CDC_WDM_PORT=$PORT break } done # fail if no cdc-wdm port exposed [ -n "${CDC_WDM_PORT}" ] || exit 2 # run qmicli operation qmicli --device-open-proxy --device=/dev/${CDC_WDM_PORT} --dms-set-fcc-authentication exit $?
03f0:4e1d
Choose...
Edit
Rename
Delete
Now
105b
Choose...
Edit
Rename
Delete
Now
105b:e0ab
Choose...
Edit
Rename
Delete
Now
1199
Choose...
Edit
Rename
Delete
Now
1199:9079
Choose...
Edit
Rename
Delete
Now
1eac
Choose...
Edit
Rename
Delete
Now
1eac:1001
Choose...
Edit
Rename
Delete
Now
413c:81a3
Choose...
Edit
Rename
Delete
Now
413c:81a8
Choose...
Edit
Rename
Delete
Now