Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
include /
linux /
netfilter /
[ HOME SHELL ]
Name
Size
Permission
Action
ipset
[ DIR ]
drwxr-xr-x
nf_conntrack_common.h
2.26
KB
-rw-r--r--
nf_conntrack_ftp.h
375
B
-rw-r--r--
nf_conntrack_sctp.h
623
B
-rw-r--r--
nf_conntrack_tcp.h
1.17
KB
-rw-r--r--
nf_conntrack_tuple_common.h
295
B
-rw-r--r--
nfnetlink.h
1.52
KB
-rw-r--r--
nfnetlink_compat.h
2.33
KB
-rw-r--r--
nfnetlink_conntrack.h
3.44
KB
-rw-r--r--
nfnetlink_log.h
2.46
KB
-rw-r--r--
nfnetlink_queue.h
2.2
KB
-rw-r--r--
x_tables.h
3.58
KB
-rw-r--r--
xt_AUDIT.h
655
B
-rw-r--r--
xt_CHECKSUM.h
500
B
-rw-r--r--
xt_CLASSIFY.h
154
B
-rw-r--r--
xt_CONNMARK.h
646
B
-rw-r--r--
xt_CONNSECMARK.h
238
B
-rw-r--r--
xt_DSCP.h
634
B
-rw-r--r--
xt_LED.h
407
B
-rw-r--r--
xt_MARK.h
157
B
-rw-r--r--
xt_NFLOG.h
326
B
-rw-r--r--
xt_NFQUEUE.h
478
B
-rw-r--r--
xt_RATEEST.h
305
B
-rw-r--r--
xt_SECMARK.h
591
B
-rw-r--r--
xt_TCPMSS.h
172
B
-rw-r--r--
xt_TCPOPTSTRIP.h
322
B
-rw-r--r--
xt_TPROXY.h
473
B
-rw-r--r--
xt_cluster.h
305
B
-rw-r--r--
xt_comment.h
176
B
-rw-r--r--
xt_connbytes.h
511
B
-rw-r--r--
xt_connlimit.h
361
B
-rw-r--r--
xt_connmark.h
542
B
-rw-r--r--
xt_conntrack.h
1.88
KB
-rw-r--r--
xt_dccp.h
420
B
-rw-r--r--
xt_dscp.h
638
B
-rw-r--r--
xt_esp.h
355
B
-rw-r--r--
xt_hashlimit.h
1.7
KB
-rw-r--r--
xt_helper.h
125
B
-rw-r--r--
xt_iprange.h
489
B
-rw-r--r--
xt_length.h
158
B
-rw-r--r--
xt_limit.h
610
B
-rw-r--r--
xt_mac.h
135
B
-rw-r--r--
xt_mark.h
149
B
-rw-r--r--
xt_multiport.h
658
B
-rw-r--r--
xt_osf.h
3.27
KB
-rw-r--r--
xt_owner.h
306
B
-rw-r--r--
xt_physdev.h
467
B
-rw-r--r--
xt_pkttype.h
125
B
-rw-r--r--
xt_policy.h
914
B
-rw-r--r--
xt_quota.h
320
B
-rw-r--r--
xt_rateest.h
774
B
-rw-r--r--
xt_realm.h
157
B
-rw-r--r--
xt_recent.h
524
B
-rw-r--r--
xt_sctp.h
2.22
KB
-rw-r--r--
xt_set.h
1.07
KB
-rw-r--r--
xt_state.h
268
B
-rw-r--r--
xt_statistic.h
653
B
-rw-r--r--
xt_string.h
601
B
-rw-r--r--
xt_tcpmss.h
190
B
-rw-r--r--
xt_tcpudp.h
1.16
KB
-rw-r--r--
xt_time.h
503
B
-rw-r--r--
xt_u32.h
695
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : x_tables.h
#ifndef _X_TABLES_H #define _X_TABLES_H #include <linux/types.h> #define XT_FUNCTION_MAXNAMELEN 30 #define XT_TABLE_MAXNAMELEN 32 struct xt_entry_match { union { struct { __u16 match_size; /* Used by userspace */ char name[XT_FUNCTION_MAXNAMELEN-1]; __u8 revision; } user; struct { __u16 match_size; /* Used inside the kernel */ struct xt_match *match; } kernel; /* Total length */ __u16 match_size; } u; unsigned char data[0]; }; struct xt_entry_target { union { struct { __u16 target_size; /* Used by userspace */ char name[XT_FUNCTION_MAXNAMELEN-1]; __u8 revision; } user; struct { __u16 target_size; /* Used inside the kernel */ struct xt_target *target; } kernel; /* Total length */ __u16 target_size; } u; unsigned char data[0]; }; #define XT_TARGET_INIT(__name, __size) \ { \ .target.u.user = { \ .target_size = XT_ALIGN(__size), \ .name = __name, \ }, \ } struct xt_standard_target { struct xt_entry_target target; int verdict; }; /* The argument to IPT_SO_GET_REVISION_*. Returns highest revision * kernel supports, if >= revision. */ struct xt_get_revision { char name[XT_FUNCTION_MAXNAMELEN-1]; __u8 revision; }; /* CONTINUE verdict for targets */ #define XT_CONTINUE 0xFFFFFFFF /* For standard target */ #define XT_RETURN (-NF_REPEAT - 1) /* this is a dummy structure to find out the alignment requirement for a struct * containing all the fundamental data types that are used in ipt_entry, * ip6t_entry and arpt_entry. This sucks, and it is a hack. It will be my * personal pleasure to remove it -HW */ struct _xt_align { __u8 u8; __u16 u16; __u32 u32; __u64 u64; }; #define XT_ALIGN(s) (((s) + (__alignof__(struct _xt_align)-1)) \ & ~(__alignof__(struct _xt_align)-1)) /* Standard return verdict, or do jump. */ #define XT_STANDARD_TARGET "" /* Error verdict. */ #define XT_ERROR_TARGET "ERROR" #define SET_COUNTER(c,b,p) do { (c).bcnt = (b); (c).pcnt = (p); } while(0) #define ADD_COUNTER(c,b,p) do { (c).bcnt += (b); (c).pcnt += (p); } while(0) struct xt_counters { __u64 pcnt, bcnt; /* Packet and byte counters */ }; /* The argument to IPT_SO_ADD_COUNTERS. */ struct xt_counters_info { /* Which table. */ char name[XT_TABLE_MAXNAMELEN]; unsigned int num_counters; /* The counters (actually `number' of these). */ struct xt_counters counters[0]; }; #define XT_INV_PROTO 0x40 /* Invert the sense of PROTO. */ /* fn returns 0 to continue iteration */ #define XT_MATCH_ITERATE(type, e, fn, args...) \ ({ \ unsigned int __i; \ int __ret = 0; \ struct xt_entry_match *__m; \ \ for (__i = sizeof(type); \ __i < (e)->target_offset; \ __i += __m->u.match_size) { \ __m = (void *)e + __i; \ \ __ret = fn(__m , ## args); \ if (__ret != 0) \ break; \ } \ __ret; \ }) /* fn returns 0 to continue iteration */ #define XT_ENTRY_ITERATE_CONTINUE(type, entries, size, n, fn, args...) \ ({ \ unsigned int __i, __n; \ int __ret = 0; \ type *__entry; \ \ for (__i = 0, __n = 0; __i < (size); \ __i += __entry->next_offset, __n++) { \ __entry = (void *)(entries) + __i; \ if (__n < n) \ continue; \ \ __ret = fn(__entry , ## args); \ if (__ret != 0) \ break; \ } \ __ret; \ }) /* fn returns 0 to continue iteration */ #define XT_ENTRY_ITERATE(type, entries, size, fn, args...) \ XT_ENTRY_ITERATE_CONTINUE(type, entries, size, 0, fn, args) #endif /* _X_TABLES_H */
Close