webshell
Ghost Exploiter Team Official
Mass Deface
Directory >>
/
home
/
whitjouh
/
public_html
/
core
/
vendor
/
intervention
/
image
/
src
/
Intervention
/
Image
/
Commands
/
Mass Deface Auto Detect Domain
/*Ubah Ke document_root untuk mass deface*/
File / Folder
Size
Action
.
-
+New File
AbstractCommand.php
1.445KB
edt
ren
Argument.php
5.578KB
edt
ren
ChecksumCommand.php
0.595KB
edt
ren
CircleCommand.php
0.903KB
edt
ren
EllipseCommand.php
0.979KB
edt
ren
ExifCommand.php
1.918KB
edt
ren
IptcCommand.php
3.042KB
edt
ren
LineCommand.php
0.945KB
edt
ren
OrientateCommand.php
0.937KB
edt
ren
PolygonCommand.php
1.264KB
edt
ren
PsrResponseCommand.php
1.178KB
edt
ren
RectangleCommand.php
0.994KB
edt
ren
ResponseCommand.php
0.547KB
edt
ren
StreamCommand.php
0.999KB
edt
ren
TextCommand.php
0.812KB
edt
ren
<?php namespace Intervention\Image\Commands; use GuzzleHttp\Psr7\Response; class PsrResponseCommand extends AbstractCommand { /** * Builds PSR7 compatible response. May replace "response" command in * some future. * * Method will generate binary stream and put it inside PSR-7 * ResponseInterface. Following code can be optimized using native php * streams and more "clean" streaming, however drivers has to be updated * first. * * @param \Intervention\Image\Image $image * @return boolean */ public function execute($image) { $format = $this->argument(0)->value(); $quality = $this->argument(1)->between(0, 100)->value(); //Encoded property will be populated at this moment $stream = $image->stream($format, $quality); $mimetype = finfo_buffer( finfo_open(FILEINFO_MIME_TYPE), $image->getEncoded() ); $this->setOutput(new Response( 200, [ 'Content-Type' => $mimetype, 'Content-Length' => strlen($image->getEncoded()) ], $stream )); return true; } }
<=Back
Liking