Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els11.x86_64 #1 SMP Sun Nov 3 09:06:59 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.133.146.94
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
cloudlinux-linksafe /
cpanel /
hooks /
[ HOME SHELL ]
Name
Size
Permission
Action
cloudlinux_linksafe_hook.sh
162
B
-rwxr-xr-x
cpanel-linksafe-delete-hooks
851
B
-rwxr-xr-x
cpanel-linksafe-install-hooks
2.15
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : cpanel-linksafe-install-hooks
#!/bin/bash CONVERT="$1" function createHookHeader(){ local hook_file="$1" local notificator="$2" local common_path="$3" if [ ! -e "${common_path}/tmp" ]; then mkdir -p "${common_path}/tmp" fi if [ ! -e "${hook_file}" ]; then echo "#!/bin/bash" > "${hook_file}" chmod 755 "${hook_file}" else chmod 755 "${hook_file}" tmp=`/bin/sed -n '/#\!\/bin\/\(ba\)\?sh/p' "${hook_file}"` if [ -z "${tmp}" ];then /bin/grep -q "${hook_file}.${notificator}.bak" "${hook_file}" if [ $? -eq 1 ];then mv -f "${hook_file}" "${hook_file}.${notificator}.bak" echo "#!/bin/bash" > "${hook_file}" echo "${hook_file}.${notificator}.bak"' "$@"' >> "${hook_file}" chmod 755 "${hook_file}" "${hook_file}.${notificator}.bak" fi fi fi } function checkHookString(){ local hook_file="$1" local pattern="$2" local comment="$3" if [ -e "${hook_file}" ];then tmp=`cat "${hook_file}" | grep "${pattern}"` if [ -z "${tmp}" ];then echo "${pattern} #${comment}" >> ${hook_file} fi fi } function removeEmptyStringsFromFile(){ local hook_file="$1" res=`sed -e '/^$/d' "${hook_file}"` echo "${res}" > "${hook_file}" } if [ ! -e "/usr/local/cpanel/cpanel" ]; then exit 0 fi if [ ! -e "/proc/sys/fs/protected_symlinks_allow_gid" -a -z "$CONVERT" ]; then exit 0 fi POSTUPCP="/scripts/postupcp" TARGET="cloudlinux-linksafe" COMMON_PATH="/usr/share/${TARGET}/cpanel/hooks" POSTUPCP_HOOK="${COMMON_PATH}/cloudlinux_linksafe_hook.sh" createHookHeader "${POSTUPCP}" "${TARGET}" "${COMMON_PATH}" checkHookString "${POSTUPCP}" "${POSTUPCP_HOOK}" "${TARGET}" removeEmptyStringsFromFile "${POSTUPCP}" # Versions before 1.1-17 have bug: script `postupcp` in some cases has wrong line due to bug that was fixed in AL-1689. # Line `/scripts/postupcp` leads to recursion and hang. # The wrong line from script `postupcp` is being removed by the following code line. DON'T REMOVE IT # Task AL-2208 reintroduced the bug sed -i '/\/scripts\/postupcp/d' "${POSTUPCP}" "${POSTUPCP_HOOK}"
Close