Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 18.223.109.25
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
local /
maldetect.bk837687 /
service /
[ HOME SHELL ]
Name
Size
Permission
Action
maldet.service
362
B
-rw-r--r--
maldet.sh
2.97
KB
-rw-r--r--
maldet.sysconfig
431
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : maldet.sh
#!/usr/bin/env bash # # maldet Linux Malware Detect monitoring # # chkconfig: 345 70 30 # description: Linux Malware Detect file monitoring # processname: maldet ### BEGIN INIT INFO # Provides: maldet # Required-Start: $local_fs $remote_fs $network $syslog $named # Required-Stop: $local_fs $remote_fs $network $syslog $named # Default-Start: 2 3 4 5 # Default-Stop: 0 1 6 # X-Interactive: true # Short-Description: Start/stop maldet in monitor mode ### END INIT INFO inspath='/usr/local/maldetect' intcnf="$inspath/internals/internals.conf" if [ -f "$intcnf" ]; then source $intcnf source $cnf else echo "$intcnf not found." exit 1 fi # Source function library. if [ -f /etc/init.d/functions ]; then . /etc/init.d/functions elif [ -f /lib/lsb/init-functions ]; then . /lib/lsb/init-functions fi if [ -f "/etc/sysconfig/maldet" ]; then . /etc/sysconfig/maldet elif [ -f "/etc/default/maldet" ]; then . /etc/default/maldet fi if [ "$default_monitor_mode" ]; then MONITOR_MODE="$default_monitor_mode" fi RETVAL=0 prog="maldet" if [ -d /var/lock/subsys ]; then LOCKFILE=/var/lock/subsys/$prog else LOCKFILE=/var/lock/$prog fi if [ -z "$MONITOR_MODE" ]; then if [ -f /etc/redhat-release ]; then echo "error no default monitor mode defined, set \$MONITOR_MODE in /etc/sysconfig/maldet, or \$default_monitor_mode in $cnf" elif [ -f /etc/debian_version ]; then echo "error no default monitor mode defined, set \$MONITOR_MODE in /etc/default/maldet, or \$default_monitor_mode in $cnf" else echo "error no default monitor mode defined, set \$MONITOR_MODE in /etc/sysconfig/maldet, or \$default_monitor_mode in $cnf" fi exit 1 fi start() { echo -n "Starting $prog: " $inspath/maldet --monitor $MONITOR_MODE RETVAL=$? [ $RETVAL -eq 0 ] && touch $LOCKFILE echo return $RETVAL } stop() { echo -n "Shutting down $prog: " if [ -f /etc/redhat-release ]; then $inspath/maldet --kill-monitor && success || failure elif [ -f /etc/debian_version ]; then $inspath/maldet --kill-monitor && log_success_msg || log_failure_msg else $inspath/maldet --kill-monitor && success || failure fi RETVAL=$? [ $RETVAL -eq 0 ] && rm -f $LOCKFILE echo return $RETVAL } restart() { stop start } status() { echo -n "Checking $prog monitoring status: " if [ "$(pgrep -f inotify.paths.[0-9]+)" ]; then echo "Running" exit 0 else echo "Not running" exit 1 fi } case "$1" in start) start ;; stop) stop ;; status) status ;; restart) restart ;; condrestart) if [ -f $LOCKFILE ]; then restart fi ;; *) echo "Usage: $prog {start|stop|status|restart|condrestart}" exit 1 ;; esac exit $RETVAL
Close