Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els11.x86_64 #1 SMP Sun Nov 3 09:06:59 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.145.38.67
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
wpa_supplicant-2.6 /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
p2p
[ DIR ]
drwxr-xr-x
60_wpa_supplicant
267
B
-rwxr-xr-x
dbus-listen-preq.py
1.53
KB
-rw-r--r--
ieee8021x.conf
269
B
-rw-r--r--
openCryptoki.conf
1.12
KB
-rw-r--r--
p2p-action-udhcp.sh
1.68
KB
-rwxr-xr-x
p2p-action.sh
2.63
KB
-rwxr-xr-x
p2p-nfc.py
19.73
KB
-rw-r--r--
plaintext.conf
133
B
-rw-r--r--
udhcpd-p2p.conf
2.86
KB
-rw-r--r--
wep.conf
170
B
-rw-r--r--
wpa-psk-tkip.conf
181
B
-rw-r--r--
wpa2-eap-ccmp.conf
284
B
-rw-r--r--
wpas-dbus-new-getall.py
1.7
KB
-rw-r--r--
wpas-dbus-new-signals.py
5.93
KB
-rw-r--r--
wpas-dbus-new-wps.py
2.17
KB
-rw-r--r--
wpas-dbus-new.py
4.17
KB
-rw-r--r--
wpas-test.py
2.51
KB
-rw-r--r--
wps-ap-cli
1.15
KB
-rwxr-xr-x
wps-nfc.py
15.31
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : p2p-action-udhcp.sh
#!/bin/sh IFNAME=$1 CMD=$2 kill_daemon() { NAME=$1 PF=$2 if [ ! -r $PF ]; then return fi PID=`cat $PF` if [ $PID -gt 0 ]; then if ps $PID | grep -q $NAME; then kill $PID fi fi rm $PF } if [ "$CMD" = "P2P-GROUP-STARTED" ]; then GIFNAME=$3 if [ "$4" = "GO" ]; then kill_daemon udhcpc /var/run/udhcpc-$GIFNAME.pid ifconfig $GIFNAME 192.168.42.1 up udhcpd /etc/udhcpd-p2p.conf fi if [ "$4" = "client" ]; then kill_daemon udhcpc /var/run/udhcpc-$GIFNAME.pid kill_daemon udhcpd /var/run/udhcpd-$GIFNAME.pid udhcpc -i $GIFNAME -p /var/run/udhcpc-$GIFNAME.pid \ -s /etc/udhcpc.script fi fi if [ "$CMD" = "P2P-GROUP-REMOVED" ]; then GIFNAME=$3 if [ "$4" = "GO" ]; then kill_daemon udhcpd /var/run/udhcpd-$GIFNAME.pid ifconfig $GIFNAME 0.0.0.0 fi if [ "$4" = "client" ]; then kill_daemon udhcpc /var/run/udhcpc-$GIFNAME.pid ifconfig $GIFNAME 0.0.0.0 fi fi if [ "$CMD" = "P2P-CROSS-CONNECT-ENABLE" ]; then GIFNAME=$3 UPLINK=$4 # enable NAT/masquarade $GIFNAME -> $UPLINK iptables -P FORWARD DROP iptables -t nat -A POSTROUTING -o $UPLINK -j MASQUERADE iptables -A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT sysctl net.ipv4.ip_forward=1 fi if [ "$CMD" = "P2P-CROSS-CONNECT-DISABLE" ]; then GIFNAME=$3 UPLINK=$4 # disable NAT/masquarade $GIFNAME -> $UPLINK sysctl net.ipv4.ip_forward=0 iptables -t nat -D POSTROUTING -o $UPLINK -j MASQUERADE iptables -D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT fi
Close