Linux polon 4.19.0-27-amd64 #1 SMP Debian 4.19.316-1 (2024-06-25) x86_64
Apache/2.4.59 (Debian)
: 10.2.73.233 | : 18.191.234.61
Cant Read [ /etc/named.conf ]
5.6.40-64+0~20230107.71+debian10~1.gbp673146
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
apparmor.d /
abstractions /
ubuntu-browsers.d /
[ HOME SHELL ]
Name
Size
Permission
Action
java
3.8
KB
-rw-r--r--
kde
248
B
-rw-r--r--
mailto
324
B
-rw-r--r--
multimedia
1.73
KB
-rw-r--r--
plugins-common
334
B
-rw-r--r--
productivity
993
B
-rw-r--r--
text-editors
654
B
-rw-r--r--
ubuntu-integration
1.4
KB
-rw-r--r--
ubuntu-integration-xul
168
B
-rw-r--r--
user-files
862
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : user-files
# vim:syntax=apparmor # Allow read to all files user has DAC access to and write access to all # files owned by the user in $HOME. @{HOME}/ r, @{HOME}/** r, owner @{HOME}/** w, # Do not allow read and/or write to particularly sensitive/problematic files #include <abstractions/private-files> audit deny @{HOME}/.ssh/{,**} mrwkl, audit deny @{HOME}/.gnome2_private/{,**} mrwkl, audit deny @{HOME}/.kde{,4}/{,share/,share/apps/} w, audit deny @{HOME}/.kde{,4}/share/apps/kwallet/{,**} mrwkl, # Comment this out if using gpg plugin/addons audit deny @{HOME}/.gnupg/{,**} mrwkl, # Allow read to all files user has DAC access to and write for files the user # owns on removable media and filesystems. /media/** r, /mnt/** r, /srv/** r, /net/** r, owner /media/** w, owner /mnt/** w, owner /srv/** w, owner /net/** w,
Close