Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
systemtap /
tapset /
linux /
ia64 /
[ HOME SHELL ]
Name
Size
Permission
Action
aux_syscalls.stp
1.33
KB
-rw-r--r--
nd_syscalls.stp
3.28
KB
-rw-r--r--
syscalls.stp
3.42
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : aux_syscalls.stp
# arch-specific requests of ptrace ___________________________ # %{ // Get _stp_val_array and _stp_lookup_* definitions. #include "linux/syscalls-common.h" static const _stp_val_array const _stp_arch_ptrace_request_list[] = { V(PTRACE_SINGLEBLOCK), V(PTRACE_OLD_GETSIGINFO), V(PTRACE_OLD_SETSIGINFO), V(PTRACE_GETREGS), V(PTRACE_SETREGS), V(PTRACE_OLDSETOPTIONS), {0, NULL} }; %} function __arch_ptrace_request_str:string(request:long) %{ /* pure */ _stp_lookup_str(_stp_arch_ptrace_request_list, (unsigned long)STAP_ARG_request, STAP_RETVALUE, MAXSTRINGLEN); %} function _arch_ptrace_argstr(request, pid, addr, data) { if (request == %{ /* pure */ PTRACE_SINGLEBLOCK %}) return sprintf("PTRACE_SINGLEBLOCK, %d, %#x, %s", pid, addr, _signal_name (data)) if (request == %{ /* pure */ PTRACE_GETREGS %} || request == %{ /* pure */ PTRACE_SETREGS %} || request == %{ /* pure */ PTRACE_OLD_GETSIGINFO %} || request == %{ /* pure */ PTRACE_OLD_SETSIGINFO %}) return sprintf("%s, %d, %#x, %p", __arch_ptrace_request_str(request), pid, addr, data) if (request == %{ /* pure */ PTRACE_OLDSETOPTIONS %}) return sprintf("PTRACE_OLDSETOPTIONS, %d, %#x, %s", pid, addr, _ptrace_options_str(data)) } function _ptrace_return_arch_prctl_addr:long(request:long, addr:long, data:long) { return 0 }
Close