Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
systemtap /
tapset /
dyninst /
[ HOME SHELL ]
Name
Size
Permission
Action
context-envvar.stp
645
B
-rw-r--r--
context.stp
2.95
KB
-rw-r--r--
ctime.stp
842
B
-rw-r--r--
endian.stp
717
B
-rw-r--r--
guru-delay.stp
561
B
-rw-r--r--
inet.stp
796
B
-rw-r--r--
target_set.stp
630
B
-rw-r--r--
timestamp_gtod.stp
852
B
-rw-r--r--
tzinfo.stp
573
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : target_set.stp
// NB: functionally equivalent to linux/target_set.stp global _target_set # map: target-set-pid -> ancestor-pid function target_set_pid (pid) { return ([pid] in _target_set) } probe init { if (target()) _target_set[target()] = stp_pid() } probe process.begin { // NB: by definition, every process we see in stapdyn is part of the // target set, so we don't need to filter like linux/target_set.stp. _target_set[pid()] = ppid() } probe process.end { delete _target_set[pid()] } function target_set_report () { printf("target set:\n") foreach (pid in _target_set+) printf("%d begat %d\n", _target_set[pid], pid) }
Close