Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.141.12.150
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
apport /
[ HOME SHELL ]
Name
Size
Permission
Action
general-hooks
[ DIR ]
drwxr-xr-x
package-hooks
[ DIR ]
drwxr-xr-x
symptoms
[ DIR ]
drwxr-xr-x
testsuite
[ DIR ]
drwxr-xr-x
apport
32.03
KB
-rwxr-xr-x
apport-checkreports
1.24
KB
-rwxr-xr-x
apport.jar
2.38
KB
-rw-r--r--
apportcheckresume
3.14
KB
-rwxr-xr-x
dump_acpi_tables.py
1.59
KB
-rwxr-xr-x
gcc_ice_hook
1.18
KB
-rwxr-xr-x
is-enabled
672
B
-rwxr-xr-x
iwlwifi_error_dump
1.92
KB
-rwxr-xr-x
java_uncaught_exception
2.58
KB
-rwxr-xr-x
kernel_crashdump
2.82
KB
-rwxr-xr-x
kernel_oops
1.2
KB
-rwxr-xr-x
package_hook
2.17
KB
-rwxr-xr-x
recoverable_problem
2.25
KB
-rwxr-xr-x
root_info_wrapper
96
B
-rwxr-xr-x
unkillable_shutdown
3.41
KB
-rwxr-xr-x
whoopsie-upload-all
6.03
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : java_uncaught_exception
#!/usr/bin/python3 '''Receive details from ApportUncaughtExceptionHandler. This generates and saves a problem report. ''' # Copyright 2010 Canonical Ltd. # Author: Matt Zimmerman <mdz@ubuntu.com> # # This program is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by the # Free Software Foundation; either version 2 of the License, or (at your # option) any later version. See http://www.gnu.org/copyleft/gpl.html for # the full text of the license. import sys if sys.version_info.major < 3: from urlparse import urlparse urlparse # pyflakes else: from urllib.parse import urlparse def make_title(report): lines = report['StackTrace'].split('\n') message = lines[0].strip() stackframe = lines[1].strip() return '%s in %s' % (message, stackframe) def main(): from apport.packaging_impl import impl as packaging if not packaging.enabled(): return -1 # read from the JVM process a sequence of key, value delimited by null # bytes items = sys.stdin.read().split('\0') d = dict() while items: key = items.pop(0) if not items: break value = items.pop(0) d[key] = value # create report import apport.report import os report = apport.report.Report(type='Crash') # assume our parent is the JVM process report.pid = os.getppid() report.add_os_info() report.add_proc_info() # these aren't relevant because the crash was in bytecode del report['ProcMaps'] del report['ProcStatus'] report.add_user_info() # add in data which was fed to us from the JVM process for key, value in d.items(): report[key] = value # Add an ExecutablePath pointing to the file where the main class resides if 'MainClassUrl' in report: url = report['MainClassUrl'] scheme, netloc, path, params, query, fragment = urlparse(url) if scheme == 'jar': # path is then a URL to the jar file scheme, netloc, path, params, query, fragment = urlparse(path) if '!/' in path: path = path.split('!/', 1)[0] if scheme == 'file': report['ExecutablePath'] = path else: # Program at some non-file URL crashed. Give up. return report['Title'] = make_title(report) try: with apport.fileutils.make_report_file(report) as f: report.write(f) except (IOError, OSError) as e: apport.fatal('Cannot create report: ' + str(e)) if __name__ == '__main__': main()
Close