Linux spg20.cloudpowerdns.com 5.14.0-611.35.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Feb 25 03:46:09 EST 2026 x86_64
LiteSpeed
Server IP : 46.4.120.162 & Your IP : 216.73.216.249
Domains :
Cant Read [ /etc/named.conf ]
User : seatingsolutions
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
lib /
.build-id /
24 /
Delete
Unzip
Name
Size
Permission
Date
Action
01251bf9a5e669d8c791e27218e5300e6fc8cc
1.27
KB
-rwxr-xr-x
2026-01-20 14:25
3498cb700c00f6b68160c9d0f4f0dc9d0d52e2
15.24
KB
-rwxr-xr-x
2025-02-04 03:47
4190f9b6ebe991d8002eb8ba7c744710919470
19.17
KB
-rwxr-xr-x
2026-02-17 11:04
43e06151f67e96fea915d551a0f1005e9a06e3
835.83
KB
-rwxr-xr-x
2025-03-13 10:07
5a2fd35c06d3cff8c63dcddb2e19f031af082b
19.17
KB
-rwxr-xr-x
2026-02-04 21:11
94736c71bf7a9125c85125c28ff17e78dc938c
14.73
KB
-rwxr-xr-x
2025-05-06 03:53
d8bc63f3ed28ef9c4426304454b66ecf13e189
15.68
KB
-rwxr-xr-x
2022-10-14 18:07
f8e592608b89e68b98808b6251b66bdacd7d7a
20.04
KB
-rwxr-xr-x
2026-02-04 03:00
Save
Rename
#!/usr/bin/bash ##CageFS proxyexec wrapper - ver 17 if [[ $EUID -eq 0 ]]; then echo 'Cannot be run as root' exit 1 fi USR=`/usr/bin/whoami` USER_TOKEN_PATH="/var/.cagefs/.cagefs.token" WEBSITE_ISOLATION_FLAG="/opt/cloudlinux/flags/enabled-flags.d/website-isolation.flag" if [[ -f "$WEBSITE_ISOLATION_FLAG" && -n "$WEBSITE_TOKEN_PATH" ]]; then USER_TOKEN_PATH="$WEBSITE_TOKEN_PATH" fi TOKEN=`/bin/cat ${USER_TOKEN_PATH}` # It's user's tmp directory and write to it is secure procedure # because this script is running only under usual user PIDFILE="/tmp/.cagefs.proxy.$$" USER_INTERRUPT=13 CWD=`pwd` ctrl_c_handler() { if [[ -f "$PIDFILE" ]]; then pid=`/bin/cat $PIDFILE` /bin/rm -f $PIDFILE > /dev/null 2>&1 /bin/kill -s SIGINT "$pid" > /dev/null 2>&1 fi exit $USER_INTERRUPT } if [[ -e /var/.cagefs/origin ]]; then ORIGIN=`/bin/cat /var/.cagefs/origin` REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN" $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" USERDOMAINS $$ "$@" RETVAL=$? else trap 'ctrl_c_handler' 2 CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" USERDOMAINS $$ "$@" RETVAL=$? /bin/rm -f $PIDFILE > /dev/null 2>&1 fi exit $RETVAL