Linux ubuntu 6.8.0-90-generic #91-Ubuntu SMP PREEMPT_DYNAMIC Tue Nov 18 14:14:30 UTC 2025 x86_64
nginx/1.24.0
: 67.217.245.49 | : 216.73.216.153
Cant Read [ /etc/named.conf ]
8.3.6
www-data
Bypass.pw
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
Backdoor Scanner
Backdoor Create
Alfa Webshell
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
pcp /
bin /
[ HOME SHELL ]
Name
Size
Permission
Action
discover
[ DIR ]
drwxr-xr-x
chkhelp
14.02
KB
-rwxr-xr-x
find-filter
14.02
KB
-rwxr-xr-x
mkaf
2.82
KB
-rwxr-xr-x
newhelp
22.57
KB
-rwxr-xr-x
pcp-atop
374.23
KB
-rwxr-xr-x
pcp-atopsar
374.23
KB
-rwxr-xr-x
pcp-buddyinfo
8.03
KB
-rwxr-xr-x
pcp-dmcache
7.13
KB
-rwxr-xr-x
pcp-dstat
74.98
KB
-rwxr-xr-x
pcp-free
9.79
KB
-rwxr-xr-x
pcp-geolocate
2.6
KB
-rwxr-xr-x
pcp-htop
290.05
KB
-rwxr-xr-x
pcp-iostat
20.79
KB
-rwxr-xr-x
pcp-ipcs
6.82
KB
-rwxr-xr-x
pcp-lvmcache
7.13
KB
-rwxr-xr-x
pcp-meminfo
7.75
KB
-rwxr-xr-x
pcp-mpstat
31.26
KB
-rwxr-xr-x
pcp-netstat
18.55
KB
-rwxr-xr-x
pcp-numastat
6.33
KB
-rwxr-xr-x
pcp-pidstat
48.4
KB
-rwxr-xr-x
pcp-ps
39.43
KB
-rwxr-xr-x
pcp-python
925
B
-rwxr-xr-x
pcp-reboot-init
2.52
KB
-rwxr-xr-x
pcp-shping
3.47
KB
-rwxr-xr-x
pcp-slabinfo
8.7
KB
-rwxr-xr-x
pcp-ss
17.4
KB
-rwxr-xr-x
pcp-summary
11.21
KB
-rwxr-xr-x
pcp-tapestat
18.38
KB
-rwxr-xr-x
pcp-uptime
4.9
KB
-rwxr-xr-x
pcp-verify
7.72
KB
-rwxr-xr-x
pcp-vmstat
1.54
KB
-rwxr-xr-x
pcp-zoneinfo
18.81
KB
-rwxr-xr-x
pmcd
119.26
KB
-rwxr-xr-x
pmcd_wait
14.51
KB
-rwxr-xr-x
pmconfig
14.52
KB
-rwxr-xr-x
pmcpp
26.51
KB
-rwxr-xr-x
pmfind_check
4.29
KB
-rwxr-xr-x
pmgetopt
23.29
KB
-rwxr-xr-x
pmhostname
14.41
KB
-rwxr-xr-x
pmie_check
21.38
KB
-rwxr-xr-x
pmie_daily
14.42
KB
-rwxr-xr-x
pmie_dump_stats
14.02
KB
-rwxr-xr-x
pmie_email
1.76
KB
-rwxr-xr-x
pmie_farm
896
B
-rwxr-xr-x
pmie_webhook
1.79
KB
-rwxr-xr-x
pmiestatus
14.02
KB
-rwxr-xr-x
pmlock
14.02
KB
-rwxr-xr-x
pmlogconf
55.26
KB
-rwxr-xr-x
pmlogextract
74.88
KB
-rwxr-xr-x
pmlogger
159.62
KB
-rwxr-xr-x
pmlogger_check
30.62
KB
-rwxr-xr-x
pmlogger_daily
55.78
KB
-rwxr-xr-x
pmlogger_daily_report
12.47
KB
-rwxr-xr-x
pmlogger_farm
919
B
-rwxr-xr-x
pmlogger_janitor
20.87
KB
-rwxr-xr-x
pmlogger_merge
6.66
KB
-rwxr-xr-x
pmlogger_rewrite
8
KB
-rwxr-xr-x
pmlogredact
1.79
KB
-rwxr-xr-x
pmlogreduce
30.7
KB
-rwxr-xr-x
pmlogrewrite
158.76
KB
-rwxr-xr-x
pmnewlog
810
B
-rwxr-xr-x
pmnsadd
2.89
KB
-rwxr-xr-x
pmnsdel
22.45
KB
-rwxr-xr-x
pmnsmerge
22.57
KB
-rwxr-xr-x
pmpause
14.02
KB
-rwxr-xr-x
pmpost
14.14
KB
-rwxr-xr-x
pmproxy
140.61
KB
-rwxr-xr-x
pmsignal
2.72
KB
-rwxr-xr-x
pmsleep
14.02
KB
-rwxr-xr-x
pmwtf
7.63
KB
-rwxr-xr-x
runaspcp
14.45
KB
-rwxr-xr-x
telnet-probe
14.02
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : pcp-verify
#!/usr/bin/env pmpython # # Copyright (C) 2015 Red Hat. # # This program is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by the # Free Software Foundation; either version 2 of the License, or (at your # option) any later version. # # This program is distributed in the hope that it will be useful, but # WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY # or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License # for more details. # # pylint: disable=C0103,R0914,R0902 """ Verify various aspects of a PCP collector installation """ import sys from pcp import pmapi, pmcc from cpmapi import PM_CONTEXT_ARCHIVE, PM_MODE_FORW STATUS = 0 # exit code indicating success/failure class Verifier(pmcc.MetricGroupPrinter): """ Common setup code used by each verification mode """ _name = '' _metrics = [] _verbose = 0 def setup(self, manager, name, verbose): manager[name] = self._metrics self._verbose = verbose self._name = name return self """ Common extract code used by each verification mode """ def current(self, group, metric): return dict(map(lambda x: (x[1], x[2]), group[metric].netValues)) class BasicReport(Verifier): """ Verifies high-level issues for a PCP collector """ _metrics = [ 'pmcd.agent.status' ] def report(self, manager): global STATUS group = manager[self._name] status = self.current(group, 'pmcd.agent.status') for pmda in sorted(status): if self._verbose: print('** DEBUG: pmda%s(1), status=%x' % (pmda, status[pmda])) lowbits = status[pmda] & 0xff if lowbits == 0x1: print('== INFO: the pmda%s(1) agent is not yet ready.' % pmda) elif lowbits == 0x2: print('== WARN: the pmda%s(1) agent exited cleanly.' % pmda) STATUS = 1 elif lowbits == 0x4: print('== FAIL: the pmda%s(1) failed to start up.' % pmda) STATUS = 2 elif lowbits == 0x8: print('== FAIL: the pmda%s(1) was timed out by pmcd.' % pmda) STATUS = 2 if self._verbose: print('** DEBUG: completed basic installation checks') class SecureReport(Verifier): """ Verifies security protocol extensions for a PCP collector """ _metrics = [ 'pmcd.feature.secure', 'pmcd.feature.authentication' ] def report(self, manager): global STATUS group = manager[self._name] status = self.current(group, 'pmcd.feature.secure') if status[''] != 1: print("== FAIL: pmcd(1) doesn't support secure sockets") print('\tCheck tutorials, verify NSS certificate database.') STATUS = 2 status = self.current(group, 'pmcd.feature.authentication') if status[''] == 0: print("== FAIL: pmcd doesn't support user authentication") print('\tCheck tutorials, verify SASL configuration.') STATUS = 2 if self._verbose: print('** DEBUG: completed secure install verification') class ContainersReport(Verifier): """ Verifies the container setup for a PCP installation """ _metrics = [ 'pmcd.agent.status', 'pmcd.agent.type', 'pmcd.feature.containers' ] def report(self, manager): global STATUS group = manager[self._name] pmdas = self.current(group, 'pmcd.agent.status') if 'linux' not in pmdas: print('== FAIL: the pmdalinux(1) agent is not installed.') print('\tCheck man page, Install PMDA from %s/pmdas/linux.' % manager.pmGetConfig('PCP_PMDAS_DIR')) STATUS = 2 elif self._verbose: print('** DEBUG: verified pmdalinux installed') if 'root' not in pmdas: print('== FAIL: the pmdaroot(1) agent is not installed.') print('\tCheck man page, Install PMDA from %s/pmdas/root.' % manager.pmGetConfig('PCP_PMDAS_DIR')) STATUS = 2 elif self._verbose: print('** DEBUG: verified pmdaroot installed') status = self.current(group, 'pmcd.agent.status') if status['root'] == 4: print('== FAIL: the pmdaroot(1) agent exited immediately.') print('\tPossible permissions issues on pmdaroot socket file?') print('\tCheck %s/pmcd/root.log for details, check selinux AVCs.' % manager.pmGetConfig('PCP_LOG_DIR')) STATUS = 2 elif self._verbose: print('** DEBUG: verified pmdaroot running') typeof = self.current(group, 'pmcd.agent.type') if typeof['linux'] == 0: print('== FAIL: the pmdalinux(1) is running as a DSO.') print('\tContainers namespace operations cannot function.') print('\tCheck man page, Install daemon PMDA %s/pmdas/linux.' % manager.pmGetConfig('PCP_PMDAS_DIR')) STATUS = 2 elif self._verbose: print('** DEBUG: verified pmdalinux non-DSO mode') status = self.current(group, 'pmcd.feature.containers') if status[''] != 1: print('== FAIL: libpcp or pmcd does not support containers.') print('\tThe running kernel or libc may not support setns(2).') print("value=%d\n", group['pmcd.feature.containers'].netValues) STATUS = 2 if self._verbose: print('** DEBUG: completed containers verification') class VerifyOptions(pmapi.pmOptions): def __init__(self): pmapi.pmOptions.__init__(self, "a:csD:h:vV?") self._mode = PM_MODE_FORW self.pmSetOptionSamples('1') # one-shot self.pmSetOptionCallback(self.option) self.pmSetOverrideCallback(self.override) self.pmSetLongOptionHeader('General Options') self.pmSetLongOptionDebug() self.pmSetLongOptionHost() self.pmSetLongOptionArchive() self.pmSetLongOptionVersion() self.pmSetLongOption("verbose", 0, 'v', '', "increase check verbosity") self.pmSetLongOptionHelp() self.pmSetLongOptionHeader('Verification Modes') self.pmSetLongOption("containers", 0, 'c', '', "check containers setup") self.pmSetLongOption("secure", 0, 's', '', "check secure connections setup") self.verify = 'basic' # default, basic verification checks self.verbose = 0 # be quiet by default def override(self, opt): """ Override any few standard PCP options we use here """ if (opt == 's'): return 1 return 0 def option(self, opt, optarg, index): """ Perform setup for an individual command line option """ # pylint: disable=W0613 if opt == 'c': self.verify = 'containers' elif opt == 's': self.verify = 'secure' elif opt == 'v': self.verbose = 1 if __name__ == '__main__': try: options = VerifyOptions() manager = pmcc.MetricGroupManager.builder(options, sys.argv) verbose = options.verbose report = options.verify if report == 'containers': manager.printer = ContainersReport().setup(manager, report, verbose) elif report == 'secure': manager.printer = SecureReport().setup(manager, report, verbose) else: manager.printer = BasicReport().setup(manager, report, verbose) sts = manager.run() if sts != 0: sys.exit(sts) sys.exit(STATUS) except pmapi.pmErr as error: print('%s: %s\n' % (error.progname(), error.message())) except pmapi.pmUsageErr as usage: usage.message() except KeyboardInterrupt: pass
Close