I am a hacker in the dark of a very cold night

path :/var/www/html/vorne.webheaydemo.com

upload file:

List of files:

name file size edit permission action
.editorconfig276 KBMarch 05 2024 07:12:340666
.env1385 KBMay 24 2024 16:43:550666
.env.example1088 KBMarch 05 2024 07:12:340666
.gitattributes190 KBMarch 05 2024 07:12:340666
.gitignore245 KBMarch 05 2024 07:12:340666
.htaccess947 KBJuly 04 2023 21:25:080664
.rnd1024 KBMarch 13 2024 04:51:140666
README.md472 KBMarch 22 2024 10:35:000666
app-March 05 2024 07:12:340777
artisan1739 KBMarch 05 2024 07:12:340666
bootstrap-March 05 2024 07:12:340777
composer.json2829 KBMay 13 2024 12:10:040666
composer.lock417205 KBMarch 19 2024 12:13:140666
config-July 03 2025 02:53:360777
database-March 05 2024 07:12:340777
index.php1816 KBMay 13 2024 10:32:360666
lang-May 13 2024 14:53:260777
manifest.json913 KBMay 14 2024 03:57:260664
package.json398 KBMarch 05 2024 07:12:340666
phpunit.xml1206 KBMarch 05 2024 07:12:340666
public-July 03 2025 02:37:200777
resources-May 13 2024 12:09:360777
routes-March 05 2024 07:12:340777
service-worker.js924 KBMarch 05 2024 07:12:340666
storage-March 05 2024 10:03:520777
symlink.php218 KBMarch 05 2024 07:12:340666
tests-March 05 2024 07:12:340777
vendor-March 19 2024 12:13:140777
vite.config.js326 KBMarch 05 2024 07:12:340666
cc-eal: help: | Common Criteria is an Information Technology Security Evaluation standard (ISO/IEC IS 15408) for computer security certification. Ubuntu 16.04 has been evaluated to assurance level EAL2 through CSEC. The evaluation was performed on Intel x86_64, IBM Power8 and IBM Z hardware platforms. cis: help: | Ubuntu Security Guide is a tool for hardening and auditing and allows for environment-specific customizations. It enables compliance with profiles such as DISA-STIG and the CIS benchmarks. Find out more at https://ubuntu.com/security/certifications/docs/usg esm-apps: help: | UA Apps: Extended Security Maintenance is enabled by default on entitled workloads. It provides access to a private PPA which includes available high and critical CVE fixes for Ubuntu LTS packages in the Ubuntu Main and Ubuntu Universe repositories from the Ubuntu LTS release date until its end of life. You can find out more about the esm service at https://ubuntu.com/security/esm esm-infra: help: | esm-infra provides access to a private ppa which includes available high and critical CVE fixes for Ubuntu LTS packages in the Ubuntu Main repository between the end of the standard Ubuntu LTS security maintenance and its end of life. It is enabled by default with Extended Security Maintenance (ESM) for UA Apps and UA Infra. You can find our more about the esm service at https://ubuntu.com/security/esm fips: help: | FIPS 140-2 is a set of publicly announced cryptographic standards developed by the National Institute of Standards and Technology applicable for FedRAMP, HIPAA, PCI and ISO compliance use cases. Note that "fips" does not provide security patching. For fips certified modules with security patches please refer to fips-updates. The modules are certified on Intel x86_64 and IBM Z hardware platforms for Ubuntu 18.04 and Intel x86_64, IBM Power8 and IBM Z hardware platforms for Ubuntu 16.04. Below is the list of fips certified components per an Ubuntu Version. You can find out more at https://ubuntu.com/security/certifications#fips fips-updates: help: | fips-updates installs fips modules including all security patches for those modules that have been provided since their certification date. You can find out more at https://ubuntu.com/security/certifications#fips. livepatch: help: | Livepatch provides selected high and critical kernel CVE fixes and other non-security bug fixes as kernel livepatches. Livepatches are applied without rebooting a machine which drastically limits the need for unscheduled system reboots. Due to the nature of fips compliance, livepatches cannot be enabled on fips-enabled systems. You can find out more about Ubuntu Kernel Livepatch service at https://ubuntu.com/security/livepatch ros: help: | ros provides access to a private PPA which includes security-related updates for available high and critical CVE fixes for Robot Operating System (ROS) packages. For access to ROS ESM and security updates, both esm-infra and esm-apps services will also be enabled. To get additional non-security updates, enable ros-updates. You can find out more about the ROS ESM service at https://ubuntu.com/robotics/ros-esm ros-updates: help: | ros-updates provides access to a private PPA which includes non-security-related updates for Robot Operating System (ROS) packages. For full access to ROS ESM, security and non-security updates, the esm-infra, esm-apps, and ros services will also be enabled. You can find out more about the ROS ESM service at https://ubuntu.com/robotics/ros-esm