Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els11.x86_64 #1 SMP Sun Nov 3 09:06:59 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.145.164.47
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
python-slip-0.4.0 /
dbus /
example /
[ HOME SHELL ]
Name
Size
Permission
Action
Makefile
1.43
KB
-rw-r--r--
README
1019
B
-rw-r--r--
example-conf-client.py
1.81
KB
-rw-r--r--
example-conf-mechanism.py
2.29
KB
-rw-r--r--
import_marker.py
0
B
-rw-r--r--
org.fedoraproject.slip.example...
527
B
-rw-r--r--
org.fedoraproject.slip.example...
122
B
-rw-r--r--
org.fedoraproject.slip.example...
963
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : org.fedoraproject.slip.example.policy
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE policyconfig PUBLIC "-//freedesktop//DTD PolicyKit Policy Configuration 1.0//EN" "http://www.freedesktop.org/standards/PolicyKit/1/policyconfig.dtd"> <policyconfig> <vendor>Example Application</vendor> <vendor_url>http://fedoraproject.org/example</vendor_url> <action id="org.fedoraproject.slip.example.write"> <description>Example Write Access</description> <message>System policy prevents write access to the Example service</message> <defaults> <allow_inactive>no</allow_inactive> <allow_active>auth_self</allow_active> </defaults> </action> <action id="org.fedoraproject.slip.example.read"> <description>Example Read Access</description> <message>System policy prevents read access to the Example service</message> <defaults> <allow_inactive>no</allow_inactive> <allow_active>yes</allow_active> </defaults> </action> </policyconfig>
Close