Linux eyewebsolution.dnshostserver.in 3.10.0-1160.119.1.el7.x86_64 #1 SMP Tue Jun 4 14:43:51 UTC 2024 x86_64
Apache
: 185.131.55.234 | : 216.73.216.138
676 Domain
5.6.40
omxrelocation
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
cloudlinux-linksafe /
cpanel /
hooks /
[ HOME SHELL ]
Name
Size
Permission
Action
tmp
[ DIR ]
drwxr-xr-x
cloudlinux_linksafe_hook.sh
162
B
-rwxr-xr-x
cpanel-linksafe-delete-hooks
908
B
-rwxr-xr-x
cpanel-linksafe-install-hooks
2.05
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : cpanel-linksafe-delete-hooks
#!/bin/bash source /opt/cloudlinux-linksafe/lib.sh function deleteAllInclude(){ hook_file="$1" tmp_name="$2" pattern="$3" common_path="$4" if [ ! -e "${common_path}/tmp" ]; then mkdir -p "${common_path}/tmp" fi if [ -e "${hook_file}" ];then cat "${hook_file}" | sed "${pattern}" > "${common_path}/tmp/${tmp_name}.tmp.$$" cat "${common_path}/tmp/${tmp_name}.tmp.$$" > "${hook_file}" rm -f "${common_path}/tmp/${tmp_name}.tmp.$$" fi } skip_on_cl_solo if [ ! -e "/usr/local/cpanel/cpanel" ]; then exit 0 fi if [ ! -e "/proc/sys/fs/protected_symlinks_allow_gid" ]; then exit 0 fi POSTUPCP="/scripts/postupcp" TARGET="cloudlinux-linksafe" COMMON_PATH="/usr/share/${TARGET}/cpanel/hooks" deleteAllInclude "${POSTUPCP}" "postupcp" "/#${TARGET}/d" "${COMMON_PATH}" chown -h :root /usr/local/cpanel/base/frontend/paper_lantern/styled/*
Close