Linux id-dci-web1980.main-hosting.eu 5.14.0-611.26.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Jan 29 05:24:47 EST 2026 x86_64
LiteSpeed
: 153.92.8.146 | : 216.73.216.214
Cant Read [ /etc/named.conf ]
8.3.30
u610877233
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
opt /
process_exporter /
[ HOME SHELL ]
Name
Size
Permission
Action
.cagefs
[ DIR ]
drwxrwx--x
.cl.selector
[ DIR ]
drwxr-xr-x
0.8.7
[ DIR ]
drwxr-xr-x
.bash_logout
18
B
-rw-r--r--
.bash_profile
141
B
-rw-r--r--
.bashrc
492
B
-rw-r--r--
process_exporter.yml
1.29
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : process_exporter.yml
# # Ansible managed # process_names: - name: mariadb comm: - mariadbd - name: s1 comm: - s1-orchestrator - s1-network - s1-agent - s1-scanner - s1-firewall - name: monarx comm: - monarx-agent - monarx-agent-auditd - name: imunify exe: - /opt/imunify360/venv/bin/python3 - /usr/sbin/imunify-realtime-av - /usr/bin/imunify-agent-proxy - /usr/sbin/imunify360-unified-access-logger - /usr/bin/imunify-resident - /usr/sbin/imunify360-php-daemon - /usr/sbin/wafd_imunify_daemon - /opt/ai-bolit/wrapper - name: wazuh exe: - /var/ossec/bin/wazuh-execd - /var/ossec/bin/wazuh-agentd - /var/ossec/bin/wazuh-syscheckd - /var/ossec/bin/wazuh-logcollector - /var/ossec/bin/wazuh-modulesd - name: hostbackup cmdline: - /hosting/tools/hostbackup.py - name: hostapi comm: - hostapi - name: lsws comm: - litespeed - name: php comm: - php - name: cron comm: - CROND - crond - name: sshd comm: - sshd - name: proftpd comm: - proftpd - name: memecached exe: - /usr/local/memcached/bin/memcached - name: redis comm: - redis-server - name: auditd exe: - /sbin/auditd - name: falcon-sensor exe: - falcon-sensor-bpf
Close