Linux e000727e84fa 5.4.0-208-generic #228-Ubuntu SMP Fri Feb 7 19:41:33 UTC 2025 x86_64
Apache/2.4.62 (Debian)
: 192.168.16.2 | : 192.168.16.1
Cant Read [ /etc/named.conf ]
8.2.27
root
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
sbin /
[ HOME SHELL ]
Name
Size
Permission
Action
a2disconf
15.86
KB
-rwxr-xr-x
a2dismod
15.86
KB
-rwxr-xr-x
a2dissite
15.86
KB
-rwxr-xr-x
a2enconf
15.86
KB
-rwxr-xr-x
a2enmod
15.86
KB
-rwxr-xr-x
a2ensite
15.86
KB
-rwxr-xr-x
a2query
9.6
KB
-rwxr-xr-x
add-shell
1.03
KB
-rwxr-xr-x
addgroup
47.25
KB
-rwxr-xr-x
adduser
47.25
KB
-rwxr-xr-x
agetty
67.49
KB
-rwxr-xr-x
apache2
712.5
KB
-rwxr-xr-x
apache2ctl
7.19
KB
-rwxr-xr-x
apachectl
7.19
KB
-rwxr-xr-x
badblocks
34.25
KB
-rwxr-xr-x
blkdiscard
34.31
KB
-rwxr-xr-x
blkid
122.34
KB
-rwxr-xr-x
blkzone
78.31
KB
-rwxr-xr-x
blockdev
78.31
KB
-rwxr-xr-x
chcpu
46.3
KB
-rwxr-xr-x
check_forensic
952
B
-rwxr-xr-x
chgpasswd
66.29
KB
-rwxr-xr-x
chmem
66.31
KB
-rwxr-xr-x
chpasswd
62.36
KB
-rwxr-xr-x
chroot
46.98
KB
-rwxr-xr-x
cpgr
60.43
KB
-rwxr-xr-x
cppw
60.43
KB
-rwxr-xr-x
ctrlaltdel
38.3
KB
-rwxr-xr-x
debugfs
233.83
KB
-rwxr-xr-x
delgroup
16.33
KB
-rwxr-xr-x
deluser
16.33
KB
-rwxr-xr-x
dpkg-fsys-usrunmess
16.99
KB
-rwxr-xr-x
dpkg-preconfigure
3.83
KB
-rwxr-xr-x
dpkg-reconfigure
4.38
KB
-rwxr-xr-x
dumpe2fs
30.31
KB
-rwxr-xr-x
e2freefrag
14.3
KB
-rwxr-xr-x
e2fsck
348.27
KB
-rwxr-xr-x
e2image
54.45
KB
-rwxr-xr-x
e2label
114.52
KB
-rwxr-xr-x
e2mmpstatus
30.31
KB
-rwxr-xr-x
e2scrub
7.12
KB
-rwxr-xr-x
e2scrub_all
5.27
KB
-rwxr-xr-x
e2undo
22.3
KB
-rwxr-xr-x
e4crypt
26.3
KB
-rwxr-xr-x
e4defrag
30.23
KB
-rwxr-xr-x
faillock
14.24
KB
-rwxr-xr-x
filefrag
18.26
KB
-rwxr-xr-x
findfs
14.3
KB
-rwxr-xr-x
fsck
54.36
KB
-rwxr-xr-x
fsck.cramfs
42.37
KB
-rwxr-xr-x
fsck.ext2
348.27
KB
-rwxr-xr-x
fsck.ext3
348.27
KB
-rwxr-xr-x
fsck.ext4
348.27
KB
-rwxr-xr-x
fsck.minix
122.34
KB
-rwxr-xr-x
fsfreeze
14.3
KB
-rwxr-xr-x
fstab-decode
14.23
KB
-rwxr-xr-x
fstrim
74.31
KB
-rwxr-xr-x
getty
67.49
KB
-rwxr-xr-x
groupadd
99.04
KB
-rwxr-xr-x
groupdel
90.85
KB
-rwxr-xr-x
groupmems
66.33
KB
-rwxr-xr-x
groupmod
99.01
KB
-rwxr-xr-x
grpck
66.3
KB
-rwxr-xr-x
grpconv
58.14
KB
-rwxr-xr-x
grpunconv
58.14
KB
-rwxr-xr-x
httxt2dbm
14.23
KB
-rwxr-xr-x
hwclock
86.44
KB
-rwxr-xr-x
iconvconfig
30.84
KB
-rwxr-xr-x
installkernel
2.6
KB
-rwxr-xr-x
invoke-rc.d
16.13
KB
-rwxr-xr-x
isosize
30.31
KB
-rwxr-xr-x
killall5
26.31
KB
-rwxr-xr-x
ldattach
34.31
KB
-rwxr-xr-x
ldconfig
959.84
KB
-rwxr-xr-x
logsave
14.09
KB
-rwxr-xr-x
losetup
114.42
KB
-rwxr-xr-x
mke2fs
138.58
KB
-rwxr-xr-x
mkfs
14.3
KB
-rwxr-xr-x
mkfs.bfs
34.31
KB
-rwxr-xr-x
mkfs.cramfs
42.24
KB
-rwxr-xr-x
mkfs.ext2
138.58
KB
-rwxr-xr-x
mkfs.ext3
138.58
KB
-rwxr-xr-x
mkfs.ext4
138.58
KB
-rwxr-xr-x
mkfs.minix
110.32
KB
-rwxr-xr-x
mkhomedir_helper
22.27
KB
-rwxr-xr-x
mklost+found
14.23
KB
-rwxr-xr-x
mkswap
114.31
KB
-rwxr-xr-x
newusers
102.92
KB
-rwxr-xr-x
nologin
14.23
KB
-rwxr-xr-x
pam-auth-update
20.79
KB
-rwxr-xr-x
pam_getenv
2.82
KB
-rwxr-xr-x
pam_namespace_helper
467
B
-rwxr-xr-x
pam_timestamp_check
14.24
KB
-rwxr-xr-x
pivot_root
14.3
KB
-rwxr-xr-x
policy-rc.d
255
B
-rwxr-xr-x
pwck
58.26
KB
-rwxr-xr-x
pwconv
54.13
KB
-rwxr-xr-x
pwhistory_helper
18.24
KB
-rwxr-xr-x
pwunconv
54.17
KB
-rwxr-xr-x
readprofile
34.34
KB
-rwxr-xr-x
remove-shell
1.08
KB
-rwxr-xr-x
resize2fs
62.3
KB
-rwxr-xr-x
rmt
59.02
KB
-rwxr-xr-x
rmt-tar
59.02
KB
-rwxr-xr-x
rtcwake
46.31
KB
-rwxr-xr-x
runuser
70.31
KB
-rwxr-xr-x
service
8.89
KB
-rwxr-xr-x
shadowconfig
2.22
KB
-rwxr-xr-x
split-logfile
2.36
KB
-rwxr-xr-x
start-stop-daemon
43.42
KB
-rwxr-xr-x
sulogin
54.31
KB
-rwxr-xr-x
swaplabel
18.3
KB
-rwxr-xr-x
swapoff
22.3
KB
-rwxr-xr-x
swapon
50.3
KB
-rwxr-xr-x
switch_root
18.3
KB
-rwxr-xr-x
sysctl
30.31
KB
-rwxr-xr-x
tarcat
936
B
-rwxr-xr-x
tune2fs
114.52
KB
-rwxr-xr-x
unix_chkpwd
38.24
KB
-rwxr-sr-x
unix_update
38.24
KB
-rwxr-xr-x
update-ca-certificates
5.29
KB
-rwxr-xr-x
update-passwd
38.49
KB
-rwxr-xr-x
update-rc.d
17.33
KB
-rwxr-xr-x
update-shells
3.89
KB
-rwxr-xr-x
useradd
155.8
KB
-rwxr-xr-x
userdel
110.95
KB
-rwxr-xr-x
usermod
143.61
KB
-rwxr-xr-x
vigr
72.64
KB
-rwxr-xr-x
vipw
72.64
KB
-rwxr-xr-x
wipefs
46.31
KB
-rwxr-xr-x
zic
58.73
KB
-rwxr-xr-x
zramctl
114.42
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : e2scrub
#!/bin/bash # Copyright (C) 2018 Oracle. All Rights Reserved. # # Author: Darrick J. Wong <darrick.wong@oracle.com> # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License # as published by the Free Software Foundation; either version 2 # of the License, or (at your option) any later version. # # This program is distributed in the hope that it would be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write the Free Software Foundation, # Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA. # Automatically check an LVM-managed filesystem online. # We use lvm snapshots to do this, which means that we can only # check filesystems in VGs that have at least 256MB (or so) of # free space. PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin if (( $EUID != 0 )); then echo "e2scrub must be run as root" exit 1 fi snap_size_mb=256 fstrim=0 reap=0 e2fsck_opts="" conffile="/etc/e2scrub.conf" test -f "${conffile}" && . "${conffile}" print_help() { echo "Usage: $0 [OPTIONS] mountpoint | device" echo echo "mountpoint must be on an LVM-managed block device" echo "-n: Show what commands e2scrub would execute." echo "-r: Remove e2scrub snapshot and exit, do not check anything." echo "-t: Run fstrim if successful." echo "-V: Print version information and exit." } print_version() { echo "e2scrub 1.47.0 (5-Feb-2023)" } exitcode() { ret="$1" # If we're being run as a service, the return code must fit the LSB # init script action error guidelines, which is to say that we # compress all errors to 1 ("generic or unspecified error", LSB 5.0 # section 22.2) and hope the admin will scan the log for what # actually happened. # We have to sleep 2 seconds here because journald uses the pid to # connect our log messages to the systemd service. This is critical # for capturing all the log messages if the scrub fails, because the # fail service uses the service name to gather log messages for the # error report. if [ -n "${SERVICE_MODE}" -a "${ret}" -ne 0 ]; then test "${ret}" -ne 0 && ret=1 sleep 2 fi exit "${ret}" } while getopts "nrtV" opt; do case "${opt}" in "n") DBG="echo Would execute: " ;; "r") reap=1;; "t") fstrim=1;; "V") print_version; exitcode 0;; *) print_help; exitcode 2;; esac done shift "$((OPTIND - 1))" arg="$1" if [ -z "${arg}" ]; then print_help exitcode 1 fi if ! type lsblk >& /dev/null ; then echo "e2scrub: can't find lsblk --- is util-linux installed?" exitcode 1 fi if ! type lvcreate >& /dev/null ; then echo "e2scrub: can't find lvcreate --- is lvm2 installed?" exitcode 1 fi # close file descriptor 3 (from cron) since it causes lvm to kvetch exec 3<&- # Find the device for a given mountpoint dev_from_mount() { local mountpt="$(realpath "$1")" lsblk -o NAME,FSTYPE,MOUNTPOINT -p -P -n 2> /dev/null | while read vars; do eval "${vars}" if [ "${mountpt}" != "${MOUNTPOINT}" ]; then continue fi case "${FSTYPE}" in ext[234]) echo "${NAME}" return 0 ;; esac done return 1 } # Check a device argument dev_from_arg() { local dev="$1" local fstype="$(lsblk -o FSTYPE -n "${dev}" 2> /dev/null)" case "${fstype}" in ext[234]) echo "${dev}" return 0 ;; esac return 1 } mnt_from_dev() { local dev="$1" if [ -n "${dev}" ]; then lsblk -o MOUNTPOINT -n "${dev}" fi } # Construct block device path and mountpoint from argument if [ -b "${arg}" ]; then dev="$(dev_from_arg "${arg}")" mnt="$(mnt_from_dev "${dev}")" else dev="$(dev_from_mount "${arg}")" mnt="${arg}" fi if [ ! -e "${dev}" ]; then echo "${arg}: Not an ext[234] filesystem." print_help exitcode 16 fi # Make sure this is an LVM device we can snapshot lvm_vars="$(lvs --nameprefixes -o name,vgname,lv_role --noheadings "${dev}" 2> /dev/null)" eval "${lvm_vars}" if [ -z "${LVM2_VG_NAME}" ] || [ -z "${LVM2_LV_NAME}" ] || echo "${LVM2_LV_ROLE}" | grep -q "snapshot"; then echo "${arg}: Not connected to an LVM logical volume." print_help exitcode 16 fi start_time="$(date +'%Y%m%d%H%M%S')" snap="${LVM2_LV_NAME}.e2scrub" snap_dev="/dev/${LVM2_VG_NAME}/${snap}" teardown() { # Remove and wait for removal to succeed. ${DBG} lvremove -f "${LVM2_VG_NAME}/${snap}" while [ -e "${snap_dev}" ] && [ "$?" -eq "5" ]; do sleep 0.5 ${DBG} lvremove -f "${LVM2_VG_NAME}/${snap}" done } check() { # First we recover the journal, then we see if e2fsck tries any # non-optimization repairs. If either of these two returns a # non-zero status (errors fixed or remaining) then this fs is bad. E2FSCK_FIXES_ONLY=1 export E2FSCK_FIXES_ONLY ${DBG} "/sbin/e2fsck" -E journal_only -p ${e2fsck_opts} "${snap_dev}" || return $? ${DBG} "/sbin/e2fsck" -f -y ${e2fsck_opts} "${snap_dev}" } mark_clean() { ${DBG} "/sbin/tune2fs" -C 0 -T "${start_time}" "${dev}" } mark_corrupt() { ${DBG} "/sbin/tune2fs" -E force_fsck "${dev}" } setup() { # Try to remove snapshot for 30s, bail out if we can't remove it. lvremove_deadline="$(( $(date "+%s") + 30))" ${DBG} lvremove -f "${LVM2_VG_NAME}/${snap}" 2>/dev/null while [ -e "${snap_dev}" ] && [ "$?" -eq "5" ] && [ "$(date "+%s")" -lt "${lvremove_deadline}" ]; do sleep 0.5 ${DBG} lvremove -f "${LVM2_VG_NAME}/${snap}" done if [ -e "${snap_dev}" ]; then echo "${arg}: e2scrub snapshot is in use, cannot check!" return 1 fi # Create the snapshot, wait for device to appear. ${DBG} lvcreate -s -L "${snap_size_mb}m" -n "${snap}" "${LVM2_VG_NAME}/${LVM2_LV_NAME}" if [ $? -ne 0 ]; then echo "${arg}: e2scrub snapshot FAILED, will not check!" return 1 fi ${DBG} udevadm settle 2> /dev/null return 0 } if [ "${reap}" -gt 0 ]; then if [ -e "${snap_dev}" ]; then teardown 2> /dev/null fi exit 0 fi if ! setup; then exitcode 8 fi trap "teardown; exit 1" EXIT INT QUIT TERM # Check and react check case "$?" in "0") # Clean check! echo "${arg}: Scrub succeeded." mark_clean teardown trap '' EXIT # Trim the free space, which requires the snapshot be deleted. if [ "${fstrim}" -eq 1 ] && [ -d "${mnt}" ] && type fstrim > /dev/null 2>&1; then echo "${arg}: Trimming free space." fstrim -v "${mnt}" fi ret=0 ;; "8") # Operational error, what now? echo "${arg}: e2fsck operational error." teardown trap '' EXIT ret=8 ;; *) # fsck failed. Check if the snapshot is invalid; if so, make a # note of that at the end of the log. This isn't necessarily a # failure because the mounted fs could have overflowed the # snapshot with regular disk writes /or/ our repair process # could have done it by repairing too much. # # If it's really corrupt we ought to fsck at next boot. is_invalid="$(lvs -o lv_snapshot_invalid --noheadings "${snap_dev}" | awk '{print $1}')" if [ -n "${is_invalid}" ]; then echo "${arg}: Scrub FAILED due to invalid snapshot." ret=8 else echo "${arg}: Scrub FAILED due to corruption! Unmount and run e2fsck -y." mark_corrupt ret=6 fi teardown trap '' EXIT ;; esac exitcode "${ret}"
Close