This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/sh | |
| # Linux Server Malware Removal Script | |
| # ============================================================================= | |
| # Based on real incident response to cryptominer infection via Next.js exploit | |
| # SPECIFICALLY: CVE-2025-66478 / CVE-2025-55182 (RCE in React Server Components) | |
| # Use at your own risk. Always backup data before running. | |
| # Ideally, rebuild the server from scratch after compromise. | |
| # ============================================================================= | |
| # | |
| # USAGE GUIDE: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <?php | |
| use App\Models\Book; | |
| const API_ENDPOINT = '/api/books'; | |
| uses()->group('books'); // Assign 'books' group to all tests (whole file) | |
| beforeEach(function () { | |
| $this->mockBooksCollection = Book::factory(5)->create(); // Generate mock database entries for testing |