Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 13.59.56.153
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
snap /
lxd /
33246 /
snap /
hooks /
[ HOME SHELL ]
Name
Size
Permission
Action
configure
3.64
KB
-rwxr-xr-x
connect-plug-ceph-conf
1.02
KB
-rwxr-xr-x
connect-plug-ovn-certificates
1.52
KB
-rwxr-xr-x
connect-plug-ovn-chassis
1.06
KB
-rwxr-xr-x
connect-plug-qemu-external
427
B
-rwxr-xr-x
disconnect-plug-ceph-conf
1.11
KB
-rwxr-xr-x
disconnect-plug-ovn-certificat...
1.1
KB
-rwxr-xr-x
disconnect-plug-ovn-chassis
1.74
KB
-rwxr-xr-x
disconnect-plug-qemu-external
424
B
-rwxr-xr-x
install
116
B
-rwxr-xr-x
remove
986
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : remove
#!/bin/sh set -eu # Re-exec outside of apparmor confinement if [ -d /sys/kernel/security/apparmor ]; then label="$(cat /proc/self/attr/current 2>/dev/null)" if [ "$label" != "unconfined" ] && [ -n "${label##*(unconfined)}" ]; then exec aa-exec -p unconfined -- "$0" "$@" fi fi # Unmount potential LXD paths. for path in "${SNAP_COMMON}/ns/shmounts" "${SNAP_COMMON}/ns/mntns" "${SNAP_COMMON}/ns" "${SNAP_COMMON}/var/lib/lxcfs/" "${SNAP_COMMON}/shmounts"; do nsenter -t 1 -m umount -l "${path}" >/dev/null 2>&1 || true done # Stop workaround unit nsenter -t 1 -m systemctl stop snap.lxd.workaround >/dev/null 2>&1 || true # Remove systemd override snippet SYSTEMD_OVERRIDE_DIR="/run/systemd/system/snap.lxd.daemon.service.d" if [ -e "${SYSTEMD_OVERRIDE_DIR}/lxd-shutdown.conf" ]; then rm "${SYSTEMD_OVERRIDE_DIR}/lxd-shutdown.conf" || true rmdir --ignore-fail-on-non-empty "${SYSTEMD_OVERRIDE_DIR}" nsenter -t 1 -m systemctl daemon-reload || true fi exit 0
Close