Linux bear.hostingplus.cl 4.18.0-513.18.1.lve.2.el8.x86_64 #1 SMP Sat Mar 30 15:36:11 UTC 2024 x86_64
LiteSpeed
Server IP : 192.140.57.17 & Your IP : 216.73.216.41
Domains :
Cant Read [ /etc/named.conf ]
User : explo
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
sbin /
Delete
Unzip
Name
Size
Permission
Date
Action
cagefs_enter_site
1.83
KB
-rwxr-xr-x
2026-01-20 11:23
chroot
41.45
KB
-rwxr-xr-x
2025-12-18 10:54
cloudlinux-selector
654
B
-rwxr-xr-x
2026-01-23 13:39
consoletype
11.88
KB
-rwxr-xr-x
2025-11-10 07:42
cracklib-check
13.05
KB
-rwxr-xr-x
2019-10-11 21:47
cracklib-format
251
B
-rwxr-xr-x
2019-10-11 21:47
cracklib-packer
13.05
KB
-rwxr-xr-x
2019-10-11 21:47
cracklib-unpacker
9.03
KB
-rwxr-xr-x
2019-10-11 21:47
create-cracklib-dict
990
B
-rwxr-xr-x
2019-10-11 21:47
ddns-confgen
20.45
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-checkds
936
B
-rwxr-xr-x
2025-11-06 04:45
dnssec-coverage
938
B
-rwxr-xr-x
2025-11-06 04:45
dnssec-dsfromkey
60.84
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-importkey
60.84
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-keyfromlabel
64.76
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-keygen
72.84
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-keymgr
934
B
-rwxr-xr-x
2025-11-06 04:45
dnssec-revoke
56.74
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-settime
60.84
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-signzone
117.2
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-verify
52.84
KB
-rwxr-xr-x
2025-11-06 04:45
exim
1.25
KB
-rwxr-xr-x
2026-02-03 15:25
faillock
20.52
KB
-rwxr-xr-x
2025-12-17 15:54
genrandom
12.38
KB
-rwxr-xr-x
2025-11-06 04:45
ip
693.3
KB
-rwxr-xr-x
2024-05-23 04:36
isc-hmac-fixup
11.85
KB
-rwxr-xr-x
2025-11-06 04:45
ldconfig
986.09
KB
-rwxr-xr-x
2025-12-08 06:43
mkhomedir_helper
24.44
KB
-rwxr-xr-x
2025-12-17 15:54
named-checkzone
36.63
KB
-rwxr-xr-x
2025-11-06 04:45
named-compilezone
36.63
KB
-rwxr-xr-x
2025-11-06 04:45
nsec3hash
12.29
KB
-rwxr-xr-x
2025-11-06 04:45
pam_console_apply
45.2
KB
-rwxr-xr-x
2025-12-17 15:54
pam_timestamp_check
11.87
KB
-rwxr-xr-x
2025-12-17 15:54
pluginviewer
20.57
KB
-rwxr-xr-x
2022-02-23 17:13
proxyexec
21.17
KB
-r-xr-xr-x
2020-09-02 03:49
pwhistory_helper
20.44
KB
-rwxr-xr-x
2025-12-17 15:54
saslauthd
94.42
KB
-rwxr-xr-x
2022-02-23 17:13
sasldblistusers2
20.77
KB
-rwxr-xr-x
2022-02-23 17:13
saslpasswd2
16.42
KB
-rwxr-xr-x
2022-02-23 17:13
sendmail
1.26
KB
-rwxr-xr-x
2026-02-03 15:25
testsaslauthd
16.66
KB
-rwxr-xr-x
2022-02-23 17:13
tmpwatch
35.47
KB
-rwxr-xr-x
2019-10-12 08:32
tsig-keygen
20.45
KB
-rwxr-xr-x
2025-11-06 04:45
unix_chkpwd
36.86
KB
-rwxr-xr-x
2025-12-17 15:54
unix_update
36.86
KB
-rwx------
2025-12-17 15:54
Save
Rename
#!/bin/bash ##CageFS proxyexec wrapper - ver 17 if [[ $EUID -eq 0 ]]; then echo 'Cannot be run as root' exit 1 fi USR=`/usr/bin/whoami` USER_TOKEN_PATH="/var/.cagefs/.cagefs.token" WEBSITE_ISOLATION_FLAG="/opt/cloudlinux/flags/enabled-flags.d/website-isolation.flag" if [[ -f "$WEBSITE_ISOLATION_FLAG" && -n "$WEBSITE_TOKEN_PATH" ]]; then USER_TOKEN_PATH="$WEBSITE_TOKEN_PATH" fi TOKEN=`/bin/cat ${USER_TOKEN_PATH}` # It's user's tmp directory and write to it is secure procedure # because this script is running only under usual user PIDFILE="/tmp/.cagefs.proxy.$$" USER_INTERRUPT=13 CWD=`pwd` ctrl_c_handler() { if [[ -f "$PIDFILE" ]]; then pid=`/bin/cat $PIDFILE` /bin/rm -f $PIDFILE > /dev/null 2>&1 /bin/kill -s SIGINT "$pid" > /dev/null 2>&1 fi exit $USER_INTERRUPT } if [[ -e /var/.cagefs/origin ]]; then ORIGIN=`/bin/cat /var/.cagefs/origin` REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN" $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" SENDMAIL $$ "$@" RETVAL=$? else trap 'ctrl_c_handler' 2 CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" SENDMAIL $$ "$@" RETVAL=$? /bin/rm -f $PIDFILE > /dev/null 2>&1 fi exit $RETVAL