Linux srv25.usacloudserver.us 5.14.0-570.39.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Sep 4 05:08:52 EDT 2025 x86_64
LiteSpeed
Server IP : 23.137.84.82 & Your IP : 216.73.216.127
Domains :
Cant Read [ /etc/named.conf ]
User : epicgamerzoneco
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
lib /
.build-id /
12 /
Delete
Unzip
Name
Size
Permission
Date
Action
24c656d90d2aa3db8fec43b44c841160b66f42
1.49
MB
-rwxr-xr-x
2022-10-17 14:37
35f2c2d6f63cdef80d906b0ef1ffb5da335d29
535.34
KB
-rwxr-xr-x
2024-10-02 21:27
39e197c0bf3870b4530017d100ad94db68e715
64.64
KB
-rwxr-xr-x
2025-06-24 12:44
5fcbb2d465f8ff7e9ea2ff96139503edeaef80
14.8
KB
-rwxr-xr-x
2025-04-24 08:11
6bd2342a8e9b038fc5253641ebe06a7cc1c818
31.7
KB
-rwxr-xr-x
2025-07-04 13:33
6cff824b8dc4842f92e16ec754c274d1045a71
19.1
KB
-rwxr-xr-x
2025-05-13 21:18
92838a3363ac1f8f970673c2db656b5fb178cb
19.16
KB
-rwxr-xr-x
2025-08-04 21:46
97392660ef09f324f9b0c92cffca30e14caaec
114.95
KB
-rwxr-xr-x
2023-07-26 14:43
989a19f662f54d447114eea05289a99308961c
23.3
KB
-rwxr-xr-x
2025-03-12 15:00
a18d622e9bfd271907c2cb75540d733aaab0ac
16.27
KB
-rwxr-xr-x
2024-04-17 17:12
b1e870b61f595afb7af187e7ee7f1ddff6ce7a
96.07
KB
-rwxr-xr-x
2024-04-03 14:59
cdcbdd6ac02fd16ef401815562f219d7bf8a58
1.06
KB
-rwxr-xr-x
2025-05-30 10:30
f72b9e44c3ffe915ab60447ba06a2aaa8197e5
75.16
KB
-rwxr-xr-x
2025-08-04 21:46
Save
Rename
#!/usr/bin/bash ##CageFS proxyexec wrapper - ver 16 if [[ $EUID -eq 0 ]]; then echo 'Cannot be run as root' exit 1 fi USR=`/usr/bin/whoami` TOKEN=`/bin/cat /var/.cagefs/.cagefs.token` # It's user's tmp directory and write to it is secure procedure # because this script is running only under usual user PIDFILE="/tmp/.cagefs.proxy.$$" USER_INTERRUPT=13 CWD=`pwd` ctrl_c_handler() { if [[ -f "$PIDFILE" ]]; then pid=`/bin/cat $PIDFILE` /bin/rm -f $PIDFILE > /dev/null 2>&1 /bin/kill -s SIGINT "$pid" > /dev/null 2>&1 fi exit $USER_INTERRUPT } if [[ -e /var/.cagefs/origin ]]; then ORIGIN=`/bin/cat /var/.cagefs/origin` REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN" $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" LVE_STATS_CONFIGS_READER $$ "$@" RETVAL=$? else trap 'ctrl_c_handler' 2 CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" LVE_STATS_CONFIGS_READER $$ "$@" RETVAL=$? /bin/rm -f $PIDFILE > /dev/null 2>&1 fi exit $RETVAL