Linux localhost 5.4.0-198-generic #218-Ubuntu SMP Fri Sep 27 20:18:53 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 23.92.16.63 | : 104.23.190.104
Cant Read [ /etc/named.conf ]
8.1.5
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
file /
[ HOME SHELL ]
Name
Size
Permission
Action
README.Debian
980
B
-rw-r--r--
README.gz
2.97
KB
-rw-r--r--
changelog.Debian.gz
850
B
-rw-r--r--
copyright
6.51
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : README.Debian
file for Debian =============== additional magic files ---------------------- How users can inject their own magics for fun: 1. open /etc/magic and /etc/magic.mime with a text editor, as root, and add your own magics. 2. have fun. How package maintainers can inject their own magics for profit: 1. place your magics as plain text files in /usr/share/file/${binary_package_name}. 2. call 'file --compile ${binary_package_name}' from /usr/share/file in your postinst script (maybe we should have a trigger for that at some point). this will produce the binary magics /usr/share/file/${binary_package_name}.mgc. 3. remove the binary magics in your postrm script. 4. profit. seccomp support --------------- Starting with version 1:5.37-1, file is built using libseccomp. This will introduce a regression if applications call the program with the --uncompress option, and file(1) needs the help of external programs for uncompression.
Close