Linux server.bornosky.com 4.18.0-477.13.1.lve.el8.x86_64 #1 SMP Thu Jun 1 16:40:47 EDT 2023 x86_64
Apache
: 95.217.200.235 | : 18.116.87.225
Cant Read [ /etc/named.conf ]
7.3.33
aggscedu
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
lib /
.build-id /
56 /
[ HOME SHELL ]
Name
Size
Permission
Action
43589995268001477df06e0b8499bc...
86.23
KB
-rwxr-xr-x
500784d351e5b38bf6e2a4af7de272...
283
KB
-rwxr-xr-x
5db3e24ebce0e3ac67f5b1b4e98933...
145.38
KB
-rwxr-xr-x
6b1eacd58cd875e53916876f117ba3...
93.66
KB
-rwxr-xr-x
75707b0a5030afc8334107f2e3d0a6...
21.95
KB
-rwxr-xr-x
79261b485e8f34cf009ae2720df392...
15.52
KB
-rwxr-xr-x
9c51d89919c9ae87c1073583878a40...
7.62
MB
-rwxr-xr-x
b34d99ef9a0a7d177920b5f475448d...
11.77
KB
-rwxr-xr-x
c16c29623c0e79e208d096ca036c3f...
73.37
KB
-rwxr-xr-x
cefbe5d22c0aec52e2e3c78cb4a961...
11.52
KB
-rwxr-xr-x
d1513091e67821324d00d6dff6325d...
11.78
KB
-rwxr-xr-x
d7c9dbe6b06bb7d63541d8cb143fee...
19.64
KB
-rwxr-xr-x
dcc8b03e9aa9e3a50090b067ab9c54...
23.64
KB
-rwxr-xr-x
ebdf38cc0a08ef8b7428fa7ec7aa3d...
43.22
KB
-rwxr-xr-x
ebed304bc8da673a5c0b1b0685e536...
1.03
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ebed304bc8da673a5c0b1b0685e536423afd80
#!/bin/bash ##CageFS proxyexec wrapper - ver 16 if [[ $EUID -eq 0 ]]; then echo 'Cannot be run as root' exit 1 fi USR=`/usr/bin/whoami` TOKEN=`/bin/cat /var/.cagefs/.cagefs.token` # It's user's tmp directory and write to it is secure procedure # because this script is running only under usual user PIDFILE="/tmp/.cagefs.proxy.$$" USER_INTERRUPT=13 CWD=`pwd` ctrl_c_handler() { if [[ -f "$PIDFILE" ]]; then pid=`/bin/cat $PIDFILE` /bin/rm -f $PIDFILE > /dev/null 2>&1 /bin/kill -s SIGINT "$pid" > /dev/null 2>&1 fi exit $USER_INTERRUPT } if [[ -e /var/.cagefs/origin ]]; then ORIGIN=`/bin/cat /var/.cagefs/origin` REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN" $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" CAGEFS_ENTER $$ "$@" RETVAL=$? else trap 'ctrl_c_handler' 2 CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" CAGEFS_ENTER $$ "$@" RETVAL=$? /bin/rm -f $PIDFILE > /dev/null 2>&1 fi exit $RETVAL
Close