Linux polon 4.19.0-27-amd64 #1 SMP Debian 4.19.316-1 (2024-06-25) x86_64
Apache/2.4.59 (Debian)
: 10.2.73.233 | : 18.117.192.205
Cant Read [ /etc/named.conf ]
5.6.40-64+0~20230107.71+debian10~1.gbp673146
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
rcS.d /
[ HOME SHELL ]
Name
Size
Permission
Action
README
447
B
-rw-r--r--
S01hostname.sh
927
B
-rwxr-xr-x
S01mountkernfs.sh
1.53
KB
-rwxr-xr-x
S02udev
6.71
KB
-rwxr-xr-x
S03keyboard-setup.sh
1.44
KB
-rwxr-xr-x
S04mountdevsubfs.sh
1.43
KB
-rwxr-xr-x
S05hwclock.sh
3.72
KB
-rwxr-xr-x
S06checkroot.sh
9.3
KB
-rwxr-xr-x
S07checkfs.sh
3.56
KB
-rwxr-xr-x
S08checkroot-bootclean.sh
1.05
KB
-rwxr-xr-x
S08kmod
2
KB
-rwxr-xr-x
S09mountall.sh
2.67
KB
-rwxr-xr-x
S10mountall-bootclean.sh
677
B
-rwxr-xr-x
S11apparmor
3.65
KB
-rwxr-xr-x
S11brightness
2.13
KB
-rwxr-xr-x
S11procps
924
B
-rwxr-xr-x
S11urandom
3.04
KB
-rwxr-xr-x
S12networking
4.34
KB
-rwxr-xr-x
S13rpcbind
2.42
KB
-rwxr-xr-x
S14nfs-common
5.53
KB
-rwxr-xr-x
S15mountnfs.sh
2.39
KB
-rwxr-xr-x
S16mountnfs-bootclean.sh
685
B
-rwxr-xr-x
S17bootmisc.sh
1.2
KB
-rwxr-xr-x
S17netfilter-persistent
1.33
KB
-rwxr-xr-x
S17x11-common
2.69
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : S11apparmor
#!/bin/sh # ---------------------------------------------------------------------- # Copyright (c) 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 # NOVELL (All rights reserved) # Copyright (c) 2008, 2009 Canonical, Ltd. # # This program is free software; you can redistribute it and/or # modify it under the terms of version 2 of the GNU General Public # License published by the Free Software Foundation. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, contact Novell, Inc. # ---------------------------------------------------------------------- # Authors: # Steve Beattie <steve.beattie@canonical.com> # Kees Cook <kees@ubuntu.com> # # /etc/init.d/apparmor # # Note: "Required-Start: $local_fs" implies that the cache may not be available # yet when /var is on a remote filesystem. The worst consequence this should # have is slowing down the boot. # ### BEGIN INIT INFO # Provides: apparmor # Required-Start: $local_fs # Required-Stop: umountfs # Default-Start: S # Default-Stop: # Short-Description: AppArmor initialization # Description: AppArmor init script. This script loads all AppArmor profiles. ### END INIT INFO APPARMOR_FUNCTIONS=/lib/apparmor/rc.apparmor.functions # Functions needed by rc.apparmor.functions . /lib/lsb/init-functions aa_action() { STRING=$1 shift $* rc=$? if [ $rc -eq 0 ] ; then aa_log_success_msg $"$STRING " else aa_log_failure_msg $"$STRING " fi return $rc } aa_log_action_start() { log_action_begin_msg $@ } aa_log_action_end() { log_action_end_msg $@ } aa_log_success_msg() { log_success_msg $@ } aa_log_warning_msg() { log_warning_msg $@ } aa_log_failure_msg() { log_failure_msg $@ } aa_log_skipped_msg() { if [ -n "$1" ]; then log_warning_msg "${1}: Skipped." fi } aa_log_daemon_msg() { log_daemon_msg $@ } aa_log_end_msg() { log_end_msg $@ } # Source AppArmor function library if [ -f "${APPARMOR_FUNCTIONS}" ]; then . ${APPARMOR_FUNCTIONS} else aa_log_failure_msg "Unable to find AppArmor initscript functions" exit 1 fi usage() { echo "Usage: $0 {start|stop|restart|reload|force-reload|status}" } test -x ${PARSER} || exit 0 # by debian policy # LSM is built-in, so it is either there or not enabled for this boot test -d /sys/module/apparmor || exit 0 # do not perform start/stop/reload actions when running from liveCD test -d /rofs/etc/apparmor.d && exit 0 rc=255 case "$1" in start) if [ -x /usr/bin/systemd-detect-virt ] && \ systemd-detect-virt --quiet --container && \ ! is_container_with_internal_policy; then aa_log_daemon_msg "Not starting AppArmor in container" aa_log_end_msg 0 exit 0 fi apparmor_start rc=$? ;; restart|reload|force-reload) if [ -x /usr/bin/systemd-detect-virt ] && \ systemd-detect-virt --quiet --container && \ ! is_container_with_internal_policy; then aa_log_daemon_msg "Not starting AppArmor in container" aa_log_end_msg 0 exit 0 fi apparmor_restart rc=$? ;; stop) aa_log_daemon_msg "Leaving AppArmor profiles loaded" cat >&2 <<EOM No profiles have been unloaded. Unloading profiles will leave already running processes permanently unconfined, which can lead to unexpected situations. To set a process to complain mode, use the command line tool 'aa-complain'. To really tear down all profiles, run 'aa-teardown'." EOM ;; status) apparmor_status rc=$? ;; *) usage rc=1 ;; esac exit $rc
Close