<!DOCTYPE html>
<html lang="en">

<head>
    <meta charset="UTF-8">
    <meta http-equiv="X-UA-Compatible" content="IE=edge">
    <meta name="viewport" content="width=device-width, initial-scale=1.0">
    <link href="https://cdn.jsdelivr.net/npm/bootstrap@5.3.0-alpha1/dist/css/bootstrap.min.css" rel="stylesheet"
        integrity="sha384-GLhlTQ8iRABdZLl6O3oVMWSktQOp6b7In1Zl3/Jr59b6EGGoI1aFkw7cmDA6j6gD" crossorigin="anonymous">
    <link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.3.0/css/all.min.css"
        integrity="sha512-SzlrxWUlpfuzQ+pcUCosxcglQRNAq/DZjVsC0lE40xsADsfeQoEypE+enwcOiGjk/bSuGGKHEyjSoQ1zVisanQ=="
        crossorigin="anonymous" referrerpolicy="no-referrer" />
</head>
</html>
<?php

$salt_config = md5(mt_rand() . microtime(true));
echo $salt_db = '$2y$11$'.__randomBase64String(22);
echo '<SOFTACULOUS>';
echo $pass = substr(crypt('[[admin_pass]]' . '[[salt_config]]', $salt_db), 29);
		
function __randomBase64String($requiredLength = 22) {

	$buffer = '';
	$rawLength = (int) ($requiredLength * 3 / 4 + 1);
	$valid = false;

	if(function_exists('mcrypt_create_iv')) {
		$buffer = mcrypt_create_iv($rawLength, MCRYPT_DEV_URANDOM);
		if($buffer) $valid = true;
	}

	if(!$valid && function_exists('openssl_random_pseudo_bytes')) {
		$buffer = openssl_random_pseudo_bytes($rawLength);
		if($buffer) $valid = true;
	}

	if(!$valid || strlen($buffer) < $rawLength) {
		$bl = strlen($buffer);
		for($i = 0; $i < $rawLength; $i++) {
			if($i < $bl) {
				$buffer[$i] = $buffer[$i] ^ chr(mt_rand(0, 255));
			} else {
				$buffer .= chr(mt_rand(0, 255));
			}
		}
	}

	$salt = str_replace('+', '.', base64_encode($buffer));
	$salt = substr($salt, 0, $requiredLength);

	$salt .= $valid; 

	return $salt;
}

@unlink('update_pass.php');

?>