Linux server60.web-hosting.com 4.18.0-513.24.1.lve.1.el8.x86_64 #1 SMP Thu May 9 15:10:09 UTC 2024 x86_64
LiteSpeed
: 198.54.116.118 | : 18.218.55.210
Cant Read [ /etc/named.conf ]
8.1.29
eterygua
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
lib64 /
nagios /
plugins /
nccustom /
[ HOME SHELL ]
Name
Size
Permission
Action
authorized_users.list
143
B
-rw-r-----
check-autobackup.sh
6.68
KB
-rwxr-xr-x
check-cagefs-status.sh
2.04
KB
-rwxr-xr-x
check-cpanel-update.sh
1.85
KB
-rwxr-xr-x
check-litespeed-version.sh
2.87
KB
-rwxr-xr-x
check-lscache-version.sh
3.84
KB
-rwxr-xr-x
check-mail-filter-avlb.sh
2.18
KB
-rwxr-xr-x
check-outmailip-rbl.py
3.99
KB
-rwxr-xr-x
check-rpmdb-integrity.sh
1.16
KB
-rwxr-xr-x
check-unexpected-systemd-servi...
8.07
KB
-rwxr-xr-x
check_backup.sh
6.35
KB
-rwxr-xr-x
check_cl_license
950
B
-rwxr-xr-x
check_cplicense.sh
268
B
-rwxr-xr-x
check_cpshell
949
B
-rwxr-xr-x
check_csf
3.72
KB
-rwxr-xr-x
check_cwaf.sh
2.44
KB
-rwxr-xr-x
check_eximq.sh
3.16
KB
-rwxr-xr-x
check_extra_accts.py
4.18
KB
-rwxr-xr-x
check_http_full_stack.conf
144
B
-rw-r--r--
check_http_full_stack.py
4.3
KB
-rwxr-xr-x
check_if_ips.py
4.15
KB
-rwxr-xr-x
check_if_ips_tcp.py
4.71
KB
-rwxr-xr-x
check_ip_update_log.sh
540
B
-rwxr-xr-x
check_ip_usage.py
6.63
KB
-rwxr-xr-x
check_kernelcare.sh
2.13
KB
-rwxr-xr-x
check_lfd_logs.conf
471
B
-rw-r--r--
check_logfiles.conf
595
B
-rw-r--r--
check_logfiles.pl
206.82
KB
-rwxr-xr-x
check_logfiles_innodbcounter.c...
1002
B
-rw-r--r--
check_mailip.py
3.83
KB
-rwxr-xr-x
check_mem.pl
12.85
KB
-rwxr-xr-x
check_mysqld_msize.sh
666
B
-rwxr-xr-x
check_nc_cp_backup_process.sh
8.75
KB
-rwxr-xr-x
check_ncsslplugin.py
1.89
KB
-rwxr-xr-x
check_ntp_client
11.78
KB
-rwxr-xr-x
check_openport.sh
7.59
KB
-rwxr-xr-x
check_pem_worker.pl
929
B
-rwxr-xr-x
check_pgactivity
294.21
KB
-rwxr-xr-x
check_plans.py
7.59
KB
-rwxr-xr-x
check_postfix_queue.sh
5.75
KB
-rwxr-xr-x
check_puppet
16.14
KB
-rwxr-xr-x
check_quota_on.sh
902
B
-rwxr-xr-x
check_ro_fs.py
2.83
KB
-rwxr-xr-x
check_service.sh
9.34
KB
-rwxr-xr-x
check_software_updates
31.68
KB
-rwxr-xr-x
check_spamd
6.7
KB
-rwxr-xr-x
check_stalled_procs.py
4.42
KB
-rwxr-xr-x
check_unauthorized_user.sh
17.16
KB
-rwxr-xr-x
replcheck_param.pl
5.48
KB
-rwxr-xr-x
systemd_scopes_whitelist
10
B
-rw-r--r--
systemd_services_folders
70
B
-rw-r--r--
systemd_services_whitelist
6.67
KB
-rw-r--r--
systemd_targets_whitelist
12
B
-rw-r--r--
test.eml
3.26
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : test.eml
Return-Path: <maximstest@s6.sb.nctest.net> Delivered-To: nctest@server5.sb.web-hosting.com Received: from server5.sb.web-hosting.com by server5.sb.web-hosting.com with LMTP id sIHkFL3ua2KNejwAYU3dmw (envelope-from <maximstest@s6.sb.nctest.net>) for <nctest@server5.sb.web-hosting.com>; Fri, 29 Apr 2022 09:57:17 -0400 Return-path: <maximstest@s6.sb.nctest.net> Envelope-to: nctest@server5.sb.web-hosting.com Delivery-date: Fri, 29 Apr 2022 09:57:17 -0400 Received: from server6-1.sb.web-hosting.com ([66.29.150.48]:48422) by server5.sb.web-hosting.com with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from <maximstest@s6.sb.nctest.net>) id 1nkR7V-00Gd5k-7X for nctest@server5.sb.web-hosting.com; Fri, 29 Apr 2022 09:57:17 -0400 Received: from [::1] (port=43120 helo=server6.sb.web-hosting.com) by server6.sb.web-hosting.com with esmtpa (Exim 4.94.2) (envelope-from <maximstest@s6.sb.nctest.net>) id 1nkR7T-00EsEX-T3 for nctest@server5.sb.web-hosting.com; Fri, 29 Apr 2022 09:57:16 -0400 MIME-Version: 1.0 Date: Fri, 29 Apr 2022 09:57:15 -0400 From: maximstest@s6.sb.nctest.net To: nctest@server5.sb.web-hosting.com Subject: =?UTF-8?Q?Attention!_This_isn=E2=80=99t_a_scam!_You_recieved_a_d?= =?UTF-8?Q?eal?= User-Agent: Roundcube Webmail/1.4.12 Message-ID: <c85c2db1c19b0b30d6d7ad00aa120374@s6.sb.nctest.net> X-Sender: maximstest@s6.sb.nctest.net Content-Type: multipart/alternative; boundary="=_95a3f2ce49cbe4158b205f876aa0a979" X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - server6.sb.web-hosting.com X-AntiAbuse: Original Domain - server5.sb.web-hosting.com X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - s6.sb.nctest.net X-Get-Message-Sender-Via: server6.sb.web-hosting.com: authenticated_id: maximstest@s6.sb.nctest.net X-Authenticated-Sender: server6.sb.web-hosting.com: maximstest@s6.sb.nctest.net X-Source: X-Source-Args: X-Source-Dir: X-From-Rewrite: unmodified, already matched X-Spam-Status: No, score= X-Spam-Score: X-Spam-Bar: X-Ham-Report: X-Spam-Flag: NO --=_95a3f2ce49cbe4158b205f876aa0a979 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=US-ASCII; format=flowed Congratilations! You have a change to get a special deal from google. Come here to check: https://google.com/your-deal [1] Earn $1000 per week! Act now! Don't hesitate! Links: ------ [1] https://evil.abc --=_95a3f2ce49cbe4158b205f876aa0a979 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=UTF-8 <html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; charset= =3DUTF-8" /></head><body style=3D'font-size: 10pt; font-family: Verdana,Gen= eva,sans-serif'> <div class=3D"pre" style=3D"margin: 0; padding: 0; font-family: monospace">= Congratilations! You have a change to get a special deal from google. Come = here to check: <a href=3D"https://evil.abc">https://google.com/your-deal</a= ></div> <div class=3D"pre" style=3D"margin: 0; padding: 0; font-family: monospace">= <br /><span>Earn $1000 per week! Act now! Don’t hesitate! </span= ></div> </body></html> --=_95a3f2ce49cbe4158b205f876aa0a979--
Close