Linux localhost 5.4.0-198-generic #218-Ubuntu SMP Fri Sep 27 20:18:53 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 23.92.16.63 | : 162.158.154.114
Cant Read [ /etc/named.conf ]
8.1.5
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
socat /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
daemon.sh
903
B
-rwxr-xr-x
ftp.sh
4.12
KB
-rwxr-xr-x
mail.sh
2.02
KB
-rwxr-xr-x
proxy.sh
1.99
KB
-rwxr-xr-x
proxyecho.sh
1.2
KB
-rwxr-xr-x
readline-test.sh
1.26
KB
-rwxr-xr-x
readline.sh
697
B
-rwxr-xr-x
socks4a-echo.sh
2.52
KB
-rwxr-xr-x
socks4echo.sh
2.31
KB
-rwxr-xr-x
test.sh
398.76
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : daemon.sh
#! /bin/sh # source: daemon.sh # Copyright Gerhard Rieger and contributors (see file CHANGES) # Published under the GNU General Public License V.2, see file COPYING # This script assumes that you create group daemon1 and user daemon1 before. # they need only the right to exist (no login etc.) # Note: this pid file mechanism is not robust! # You will adapt these variables USER=daemon1 GROUP=daemon1 INIF=fwnonsec.domain.org OUTIF=fwsec.domain.org TARGET=w3.intra.domain.org INPORT=80 DSTPORT=80 # INOPTS="fork,setgid=$GROUP,setuid=$USER" OUTOPTS= PIDFILE=/var/run/socat-$INPORT.pid OPTS="-d -d -lm" # notice to stderr, then to syslog SOCAT=/usr/local/bin/socat if [ "$1" = "start" -o -z "$1" ]; then $SOCAT $OPTS tcp-l:$INPORT,bind=$INIF,$INOPTS tcp:$TARGET:$DSTPORT,bind=$OUTIF,$OUTOPTS </dev/null & echo $! >$PIDFILE elif [ "$1" = "stop" ]; then /bin/kill $(/bin/cat $PIDFILE) fi
Close