Linux id-dci-web1412.main-hosting.eu 5.14.0-611.20.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Jan 14 06:35:04 EST 2026 x86_64
LiteSpeed
: 2a02:4780:6:1512:0:19fc:adf1:2 | : 216.73.216.140
Cant Read [ /etc/named.conf ]
8.1.34
u435990001
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
opt /
cloudlinux /
venv /
bin /
[ HOME SHELL ]
Name
Size
Permission
Action
Activate.ps1
8.82
KB
-rw-r--r--
activate
1.65
KB
-rw-r--r--
activate.csh
915
B
-rw-r--r--
activate.fish
2.14
KB
-rw-r--r--
alembic
229
B
-rwxr-xr-x
cagefs_enter_site.py
1.83
KB
-rwxr-xr-x
cagefsctl_user.py
12.89
KB
-rwxr-xr-x
chardetect
237
B
-rwxr-xr-x
cl_sysctl
4.51
KB
-rwxr-xr-x
clcpapi
3.64
KB
-rwxr-xr-x
coverage
231
B
-rwxr-xr-x
coverage-3.11
231
B
-rwxr-xr-x
coverage3
231
B
-rwxr-xr-x
cpanel-dbmapping
3.84
KB
-rwxr-xr-x
crontab-user-wrapper.py
2.46
KB
-rwxr-xr-x
da_suid_caller.py
686
B
-rw-r--r--
detect-requirements
238
B
-rwxr-xr-x
dodgy
224
B
-rwxr-xr-x
epylint
235
B
-rwxr-xr-x
f2py
232
B
-rwxr-xr-x
f2py3
232
B
-rwxr-xr-x
f2py3.11
232
B
-rwxr-xr-x
flake8
230
B
-rwxr-xr-x
futurize
231
B
-rwxr-xr-x
get_gprof
1.84
KB
-rwxr-xr-x
get_objgraph
1.63
KB
-rwxr-xr-x
isort
225
B
-rwxr-xr-x
isort-identify-imports
259
B
-rwxr-xr-x
jsonschema
229
B
-rwxr-xr-x
lvestats_config_reader.py
1.12
KB
-rw-r--r--
mako-render
229
B
-rwxr-xr-x
normalizer
260
B
-rwxr-xr-x
pasteurize
233
B
-rwxr-xr-x
pip
237
B
-rwxr-xr-x
pip3
237
B
-rwxr-xr-x
pip3.11
237
B
-rwxr-xr-x
plesk_suid_caller.py
905
B
-rw-r--r--
prospector
229
B
-rwxr-xr-x
py.test
237
B
-rwxr-xr-x
pycodestyle
228
B
-rwxr-xr-x
pydocstyle
229
B
-rwxr-xr-x
pyflakes
227
B
-rwxr-xr-x
pylint
233
B
-rwxr-xr-x
pylint-config
249
B
-rwxr-xr-x
pyreverse
239
B
-rwxr-xr-x
pysemver
225
B
-rwxr-xr-x
pytest
237
B
-rwxr-xr-x
python
15.01
KB
-rwxr-xr-x
python3
15.01
KB
-rwxr-xr-x
python3.11
15.01
KB
-rwxr-xr-x
raven
235
B
-rwxr-xr-x
symilar
235
B
-rwxr-xr-x
tap
223
B
-rwxr-xr-x
tappy
223
B
-rwxr-xr-x
undill
603
B
-rwxr-xr-x
virtualenv
254
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : cagefs_enter_site.py
#!/opt/cloudlinux/venv/bin/python3 -sbb # -*- coding: utf-8 -*- # # Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2025 All Rights Reserved # # Licensed under CLOUD LINUX LICENSE AGREEMENT # https://cloudlinux.com/docs/LICENCE.TXT # """ Execute a command inside CageFS for a site (document root or domain). This wrapper provides a command-line interface for executing commands within the isolated CageFS environment for a specific website. """ import argparse import os import sys from clcagefslib.webisolation import libenter def create_parser(): """ Create argument parser for cagefs_enter_site. Returns: argparse.ArgumentParser: Configured argument parser """ parser = argparse.ArgumentParser( # the command is named with _underscores_ to match # existing cagefs_enter wrapper from lvewrappers prog="cagefs_enter_site", description="Execute a command inside CageFS for a site (document root or domain)", ) parser.add_argument("site", type=str, help="Document root or domain") parser.add_argument( "command", type=str, nargs=argparse.REMAINDER, help="Command to execute" ) return parser def main(): """ Main entry point. Returns: int: Exit code """ parser = create_parser() args = parser.parse_args() if not args.command: parser.error("COMMAND is required") try: return libenter.enter_site(args.site, args.command) except ValueError as e: print(f"Error: {e}", file=sys.stderr) return 1 except KeyboardInterrupt: # Clean Ctrl+C exit without traceback (exit code 130 = SIGINT). return 130 if __name__ == "__main__": if os.geteuid() == 0: print("Error: This program can not be run as root", file=sys.stderr) sys.exit(1) sys.exit(main())
Close