Linux premium309.web-hosting.com 4.18.0-553.45.1.lve.el8.x86_64 #1 SMP Wed Mar 26 12:08:09 UTC 2025 x86_64
LiteSpeed
Server IP : 199.188.201.183 & Your IP : 216.73.216.116
Domains :
Cant Read [ /etc/named.conf ]
User : brntxyqh
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
sbin /
Delete
Unzip
Name
Size
Permission
Date
Action
cagefs_enter_site
1.83
KB
-rwxr-xr-x
2026-01-20 14:23
chroot
41.45
KB
-rwxr-xr-x
2025-12-18 13:54
cloudlinux-selector
654
B
-rwxr-xr-x
2025-12-15 14:07
consoletype
11.88
KB
-rwxr-xr-x
2025-11-10 10:42
cracklib-check
13.05
KB
-rwxr-xr-x
2019-10-12 00:47
cracklib-format
251
B
-rwxr-xr-x
2019-10-12 00:47
cracklib-packer
13.05
KB
-rwxr-xr-x
2019-10-12 00:47
cracklib-unpacker
9.03
KB
-rwxr-xr-x
2019-10-12 00:47
create-cracklib-dict
990
B
-rwxr-xr-x
2019-10-12 00:47
cxs
1.25
KB
-rwxr-xr-x
2025-07-31 08:25
ddns-confgen
20.45
KB
-rwxr-xr-x
2025-11-06 07:45
dnssec-checkds
936
B
-rwxr-xr-x
2025-11-06 07:45
dnssec-coverage
938
B
-rwxr-xr-x
2025-11-06 07:45
dnssec-dsfromkey
60.84
KB
-rwxr-xr-x
2025-11-06 07:45
dnssec-importkey
60.84
KB
-rwxr-xr-x
2025-11-06 07:45
dnssec-keyfromlabel
64.76
KB
-rwxr-xr-x
2025-11-06 07:45
dnssec-keygen
72.84
KB
-rwxr-xr-x
2025-11-06 07:45
dnssec-keymgr
934
B
-rwxr-xr-x
2025-11-06 07:45
dnssec-revoke
56.74
KB
-rwxr-xr-x
2025-11-06 07:45
dnssec-settime
60.84
KB
-rwxr-xr-x
2025-11-06 07:45
dnssec-signzone
117.2
KB
-rwxr-xr-x
2025-11-06 07:45
dnssec-verify
52.84
KB
-rwxr-xr-x
2025-11-06 07:45
exim
1.25
KB
-rwxr-xr-x
2025-12-17 16:20
faillock
20.52
KB
-rwxr-xr-x
2025-12-17 18:54
genrandom
12.38
KB
-rwxr-xr-x
2025-11-06 07:45
ip
693.3
KB
-rwxr-xr-x
2024-05-23 08:36
isc-hmac-fixup
11.85
KB
-rwxr-xr-x
2025-11-06 07:45
ldconfig
986.09
KB
-rwxr-xr-x
2025-12-08 09:43
mkhomedir_helper
24.44
KB
-rwxr-xr-x
2025-12-17 18:54
named-checkzone
36.63
KB
-rwxr-xr-x
2025-11-06 07:45
named-compilezone
36.63
KB
-rwxr-xr-x
2025-11-06 07:45
nsec3hash
12.29
KB
-rwxr-xr-x
2025-11-06 07:45
pam_console_apply
45.2
KB
-rwxr-xr-x
2025-12-17 18:54
pam_timestamp_check
11.87
KB
-rwxr-xr-x
2025-12-17 18:54
pluginviewer
20.57
KB
-rwxr-xr-x
2022-02-23 20:13
proxyexec
21.17
KB
-r-xr-xr-x
2020-09-02 07:49
pwhistory_helper
20.44
KB
-rwxr-xr-x
2025-12-17 18:54
saslauthd
94.42
KB
-rwxr-xr-x
2022-02-23 20:13
sasldblistusers2
20.77
KB
-rwxr-xr-x
2022-02-23 20:13
saslpasswd2
16.42
KB
-rwxr-xr-x
2022-02-23 20:13
sendmail
1.26
KB
-rwxr-xr-x
2025-12-17 16:20
testsaslauthd
16.66
KB
-rwxr-xr-x
2022-02-23 20:13
tmpwatch
35.47
KB
-rwxr-xr-x
2019-10-12 11:32
tsig-keygen
20.45
KB
-rwxr-xr-x
2025-11-06 07:45
unix_chkpwd
36.86
KB
-rwxr-xr-x
2025-12-17 18:54
unix_update
36.86
KB
-rwx------
2025-12-17 18:54
Save
Rename
#!/opt/cloudlinux/venv/bin/python3 -sbb # -*- coding: utf-8 -*- # # Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2025 All Rights Reserved # # Licensed under CLOUD LINUX LICENSE AGREEMENT # https://cloudlinux.com/docs/LICENCE.TXT # """ Execute a command inside CageFS for a site (document root or domain). This wrapper provides a command-line interface for executing commands within the isolated CageFS environment for a specific website. """ import argparse import os import sys from clcagefslib.webisolation import libenter def create_parser(): """ Create argument parser for cagefs_enter_site. Returns: argparse.ArgumentParser: Configured argument parser """ parser = argparse.ArgumentParser( # the command is named with _underscores_ to match # existing cagefs_enter wrapper from lvewrappers prog="cagefs_enter_site", description="Execute a command inside CageFS for a site (document root or domain)", ) parser.add_argument("site", type=str, help="Document root or domain") parser.add_argument( "command", type=str, nargs=argparse.REMAINDER, help="Command to execute" ) return parser def main(): """ Main entry point. Returns: int: Exit code """ parser = create_parser() args = parser.parse_args() if not args.command: parser.error("COMMAND is required") try: return libenter.enter_site(args.site, args.command) except ValueError as e: print(f"Error: {e}", file=sys.stderr) return 1 except KeyboardInterrupt: # Clean Ctrl+C exit without traceback (exit code 130 = SIGINT). return 130 if __name__ == "__main__": if os.geteuid() == 0: print("Error: This program can not be run as root", file=sys.stderr) sys.exit(1) sys.exit(main())