Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.213
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
libexec /
webmin /
virtualmin-htpasswd /
[ HOME SHELL ]
Name
Size
Permission
Action
help
[ DIR ]
drwxr-xr-x
lang
[ DIR ]
drwxr-xr-x
CHANGELOG
404
B
-rw-r--r--
LICENSE
34.32
KB
-rw-r--r--
add.cgi
3.14
KB
-rwxr-xr-x
add_form.cgi
1.52
KB
-rwxr-xr-x
cgi_args.pl
279
B
-rwxr-xr-x
create-protected-directory.pl
4.78
KB
-rwxr-xr-x
create-protected-user.pl
3.63
KB
-rwxr-xr-x
delete-protected-directory.pl
3.35
KB
-rwxr-xr-x
delete-protected-user.pl
2.64
KB
-rwxr-xr-x
delete.cgi
1.82
KB
-rwxr-xr-x
find.cgi
1.79
KB
-rwxr-xr-x
index.cgi
2.42
KB
-rwxr-xr-x
install-type
4
B
-rw-r--r--
list-protected-directories.pl
3.01
KB
-rwxr-xr-x
list-protected-users.pl
2.99
KB
-rwxr-xr-x
module.info
147
B
-rw-r--r--
module.info.af.auto
34
B
-rw-r--r--
module.info.ar.auto
49
B
-rw-r--r--
module.info.be.auto
41
B
-rw-r--r--
module.info.bg.auto
65
B
-rw-r--r--
module.info.ca.auto
44
B
-rw-r--r--
module.info.cs.auto
42
B
-rw-r--r--
module.info.da.auto
40
B
-rw-r--r--
module.info.de.auto
45
B
-rw-r--r--
module.info.el.auto
79
B
-rw-r--r--
module.info.es.auto
45
B
-rw-r--r--
module.info.eu.auto
43
B
-rw-r--r--
module.info.fa.auto
58
B
-rw-r--r--
module.info.fi
40
B
-rw-r--r--
module.info.fr.auto
47
B
-rw-r--r--
module.info.he.auto
45
B
-rw-r--r--
module.info.hr.auto
41
B
-rw-r--r--
module.info.hu.auto
40
B
-rw-r--r--
module.info.it.auto
41
B
-rw-r--r--
module.info.ja.auto
43
B
-rw-r--r--
module.info.ko.auto
39
B
-rw-r--r--
module.info.lt.auto
45
B
-rw-r--r--
module.info.lv.auto
41
B
-rw-r--r--
module.info.ms.auto
40
B
-rw-r--r--
module.info.mt.auto
43
B
-rw-r--r--
module.info.nl
42
B
-rw-r--r--
module.info.no
40
B
-rw-r--r--
module.info.pl.auto
39
B
-rw-r--r--
module.info.pt.auto
45
B
-rw-r--r--
module.info.pt_BR.auto
48
B
-rw-r--r--
module.info.ro.auto
40
B
-rw-r--r--
module.info.ru.auto
57
B
-rw-r--r--
module.info.sk.auto
40
B
-rw-r--r--
module.info.sl.auto
41
B
-rw-r--r--
module.info.sv.auto
38
B
-rw-r--r--
module.info.th.auto
111
B
-rw-r--r--
module.info.tr.auto
38
B
-rw-r--r--
module.info.uk.auto
63
B
-rw-r--r--
module.info.ur.auto
72
B
-rw-r--r--
module.info.vi.auto
41
B
-rw-r--r--
module.info.zh.auto
37
B
-rw-r--r--
module.info.zh_TW.auto
40
B
-rw-r--r--
virtual_feature.pl
7.38
KB
-rwxr-xr-x
virtualmin-htpasswd-lib.pl
2.03
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : list-protected-users.pl
#!/usr/bin/perl use strict; use warnings; our $module_name; =head1 list-protected-users.pl Lists users in some protected directory. This command outputs a table of all users with access to some protected directory, identified by the C<--domain> and C<--path> flags. You an also switch to a more easily parsed format with the C<--multiline> flag, or get just a list of usernames with the C<--name-only> flag. =cut package virtualmin_htpasswd; if (!$module_name) { no warnings "once"; $main::no_acl_check++; use warnings "once"; $ENV{'WEBMIN_CONFIG'} ||= "/etc/webmin"; $ENV{'WEBMIN_VAR'} ||= "/var/webmin"; my $pwd; if ($0 =~ /^(.*)\/[^\/]+$/) { chdir($pwd = $1); } else { chop($pwd = `pwd`); } $0 = "$pwd/list-protected-users.pl"; require './virtualmin-htpasswd-lib.pl'; $< == 0 || die "list-protected-users must be run as root"; } my @OLDARGV = @ARGV; # Parse command-line args my ($dname, $path, $multiline, $nameonly); while(@ARGV > 0) { my $a = shift(@ARGV); if ($a eq "--domain") { $dname = shift(@ARGV); } elsif ($a eq "--path") { $path = shift(@ARGV); } elsif ($a eq "--multiline") { $multiline = 1; } elsif ($a eq "--name-only") { $nameonly = 1; } else { &usage(); } } # Validate parameters $dname || &usage("Missing --domain parameter"); $path || &usage("Missing --directory parameter"); my $d = &virtual_server::get_domain_by("dom", $dname); $d || &usage("No domain named $dname found"); # Get the directories for this domain my @dirs = &htaccess_htpasswd::list_directories(); @dirs = grep { &can_directory($_->[0], $d) } @dirs; my ($dir) = grep { $_->[0] eq $path || &remove_public_html($_->[0], $d) eq $path } @dirs; $dir || &usage("Directory $path is not registered"); # Get the users for the dir my $users = $dir->[2] == 3 ? &htaccess_htpasswd::list_digest_users($dir->[1]) : &htaccess_htpasswd::list_users($dir->[1]); if ($nameonly) { # Just the usernames foreach my $u (@$users) { print $u->{'user'},"\n"; } } elsif ($multiline) { # Show all details foreach my $u (@$users) { print $u->{'user'},"\n"; print " Hashed password: $u->{'pass'}\n"; print " Enabled: ",($u->{'enabled'} ? "Yes" : "No"),"\n"; } } else { # Show table my $fmt = "%-40.40s %-39.39s\n"; printf $fmt, "Username", "Hashed password"; printf $fmt, ("-" x 40), ("-" x 39); foreach my $u (@$users) { printf $fmt, $u->{'user'}, $u->{'pass'}; } } sub usage { print "$_[0]\n\n" if ($_[0]); print "Lists users in some protected directory.\n"; print "\n"; print "virtualmin list-protected-users --domain name\n"; print " --path directory\n"; print " [--multiline | --name-only]\n"; exit(1); }
Close