Linux premium180.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
LiteSpeed
: 162.0.209.168 | : 216.73.216.187
Cant Read [ /etc/named.conf ]
8.3.30
nortrmdp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
lib /
.build-id /
fe /
[ HOME SHELL ]
Name
Size
Permission
Action
0b8477af6553918722070ae3ed3c60...
56.88
KB
-rwxr-xr-x
16f4af0cf41e838cc8a8866b9c2d7d...
20.44
KB
-rwxr-xr-x
1bcaa1339d33cad50a70d2723c90a4...
183.5
KB
-rwxr-xr-x
2aba0aa06a41bba5f9c7a6e61c16b7...
2.13
MB
-rwxr-xr-x
2d84b279df6d2ae4173d672e749b74...
133.27
KB
-rwxr-xr-x
2f8563d3ec9b2c7d348e260c015eb2...
1.49
KB
-rwxr-xr-x
35b3391c6826104262fa8243388032...
82.91
KB
-rwxr-xr-x
421e2f7579952493ef111ead4f8df4...
328.89
KB
-rwxr-xr-x
4e5e5bdb07fc2331f89b9e2870b8b5...
45.95
KB
-rwxr-xr-x
4f071bd003d73ae67f19054507dba2...
33.6
KB
-rwxr-xr-x
592ea95ddcd851e9e12501bc7b4cbf...
20.21
KB
-rwxr-xr-x
7967e886a8edc6c7e15421a8e3564c...
11.46
KB
-rwxr-xr-x
7c83deb7cf938f7807ee7acf0e2faa...
15.59
KB
-rwxr-xr-x
8a15a1671f8bce237b3a467000d662...
191.49
KB
-rwxr-xr-x
8abcd9b89dbf258179373bfffa24bc...
287.58
KB
-rwxr-xr-x
90daa0dab8e10675c9e075ffd473ec...
11.49
KB
-rwxr-xr-x
9236b1eb5f021123500aa5249b1bc5...
11.68
KB
-rwxr-xr-x
93807e310e65e827f184ab52b32a23...
6.76
MB
-rwxr-xr-x
9ec9a9b47f9250794c75e062457079...
41.52
KB
-rwxr-xr-x
a418fa6c2cd28e433fe61e9b8ee56e...
128.08
KB
-rwxr-xr-x
ada27cd73dea44d79bbd45157e1091...
11.95
KB
-rwxr-xr-x
b3356342088c5b7dda898af387e3ed...
45.55
KB
-rwxr-xr-x
c57bd1a7f75c5f3cb075ec6a7b54b8...
127.77
KB
-rwxr-xr-x
ca3feabdde35e5dda4c636d1d96e37...
11.99
KB
-rwxr-xr-x
e3ca16c965cb8df22f7799350e57de...
11.6
KB
-rwxr-xr-x
fda1efd798197aec8c0cb06242b10f...
40.49
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : 2f8563d3ec9b2c7d348e260c015eb237574379
#!/bin/bash ##CageFS proxyexec wrapper - ver 18 if [[ $EUID -eq 0 ]]; then echo 'Cannot be run as root' exit 1 fi USR=`/usr/bin/whoami` CWD=`pwd` TOKEN=`/bin/cat /var/.cagefs/.cagefs.token` # It's user's tmp directory and write to it is secure procedure # because this script is running only under usual user LOCKFILE=/tmp/.crontab.lock # automatically obtain next available fd # previous strategy with `ulimit -n` failed # in environment where limit is very high (e.g. 1073741816) exec {FD}>$LOCKFILE if [[ -e /var/.cagefs/origin ]]; then ORIGIN=`/bin/cat /var/.cagefs/origin` REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN" else REMOTE="" fi eval "( /usr/bin/flock -x -w 10 $FD || exit 1 echo -n \"\" | $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_CHECK $$ ) $FD> $LOCKFILE" [ $? -ne 0 ] && exit 1 eval "( /usr/bin/flock -x -w 10 $FD || exit 1 $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_LIST $$ 2>/dev/null |cat > /var/spool/cron/$USR ) $FD> $LOCKFILE" /usr/bin/crontab.cagefs $@ eval "( /usr/bin/flock -x -w 10 $FD || exit 1 if [ -e /var/spool/cron/$USR ]; then cat /var/spool/cron/$USR | $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_SAVE $$ 2>/dev/null else echo -n \"\" | $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock \"$USR\" \"$CWD\" CRONTAB_SAVE $$ 2>/dev/null fi ) $FD>$LOCKFILE"
Close