Linux ubuntu 6.8.0-90-generic #91-Ubuntu SMP PREEMPT_DYNAMIC Tue Nov 18 14:14:30 UTC 2025 x86_64
nginx/1.24.0
: 67.217.245.49 | : 216.73.216.153
Cant Read [ /etc/named.conf ]
8.3.6
www-data
Bypass.pw
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
Backdoor Scanner
Backdoor Create
Alfa Webshell
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
pcp /
htop /
screens /
[ HOME SHELL ]
Name
Size
Permission
Action
biosnoop
820
B
-rw-r--r--
cgroups
1.15
KB
-rw-r--r--
cgroupsio
1.3
KB
-rw-r--r--
cgroupsmem
1.03
KB
-rw-r--r--
devices
3.16
KB
-rw-r--r--
execsnoop
723
B
-rw-r--r--
exitsnoop
960
B
-rw-r--r--
filesystems
1009
B
-rw-r--r--
opensnoop
479
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : execsnoop
# # pcp-htop(1) configuration file - see pcp-htop(5) # [execsnoop] heading = ExecSnoop caption = BPF exec(2) syscall snoop default = false pid.heading = PID pid.caption = Process Identifier pid.metric = bpf.execsnoop.pid pid.format = process ppid.heading = PPID ppid.caption = Parent Process ppid.metric = bpf.execsnoop.ppid ppid.format = process uid.heading = UID uid.caption = User Identifier uid.metric = bpf.execsnoop.uid comm.heading = COMM comm.caption = Command comm.width = -16 comm.metric = bpf.execsnoop.comm comm.format = command ret.heading = RET ret.caption = Return Code ret.metric = bpf.execsnoop.ret path.heading = Arguments path.caption = Arguments path.width = -12 path.metric = bpf.execsnoop.args
Close