Linux quad-clini-stageVM 5.4.0-1109-azure #115~18.04.1-Ubuntu SMP Mon May 22 20:06:37 UTC 2023 x86_64
Apache/2.4.29 (Ubuntu)
: 10.2.0.4 | : 3.139.93.209
Cant Read [ /etc/named.conf ]
7.4.25
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
apport /
[ HOME SHELL ]
Name
Size
Permission
Action
general-hooks
[ DIR ]
drwxr-xr-x
package-hooks
[ DIR ]
drwxr-xr-x
symptoms
[ DIR ]
drwxr-xr-x
testsuite
[ DIR ]
drwxr-xr-x
apport
31.6
KB
-rwxr-xr-x
apport-checkreports
1.24
KB
-rwxr-xr-x
apport.jar
2.38
KB
-rw-r--r--
apportcheckresume
3.14
KB
-rwxr-xr-x
dump_acpi_tables.py
1.41
KB
-rwxr-xr-x
dump_acpi_tables.pyc
1.53
KB
-rw-r--r--
gcc_ice_hook
1.18
KB
-rwxr-xr-x
is-enabled
672
B
-rwxr-xr-x
iwlwifi_error_dump
1.92
KB
-rwxr-xr-x
java_uncaught_exception
2.58
KB
-rwxr-xr-x
kernel_crashdump
2.82
KB
-rwxr-xr-x
kernel_oops
1.2
KB
-rwxr-xr-x
package_hook
2.15
KB
-rwxr-xr-x
recoverable_problem
2.25
KB
-rwxr-xr-x
root_info_wrapper
96
B
-rwxr-xr-x
unkillable_shutdown
3.41
KB
-rwxr-xr-x
whoopsie-upload-all
5.58
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : unkillable_shutdown
#!/usr/bin/python3 # # Collect information about processes which are still running after sending # SIGTERM to them (which happens during computer shutdown in # /etc/init.d/sendsigs in Debian/Ubuntu) # # Copyright (c) 2010 Canonical Ltd. # Author: Martin Pitt <martin.pitt@ubuntu.com> # # This program is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by the # Free Software Foundation; either version 2 of the License, or (at your # option) any later version. See http://www.gnu.org/copyleft/gpl.html for # the full text of the license. import os, os.path, sys, errno, optparse import apport, apport.fileutils, apport.hookutils def parse_argv(): '''Parse command line and return (options, args).''' optparser = optparse.OptionParser('%prog [options]') optparser.add_option('-o', '--omit', metavar='PID', action='append', default=[], dest='blacklist', help='Ignore a particular process ID (can be specified multiple times)') (opts, args) = optparser.parse_args() if len(args) != 0: optparser.error('This program does not take any non-option arguments. Please see --help.') sys.exit(1) return (opts, args) def orphaned_processes(blacklist): '''Yield an iterator of running process IDs. This excludes PIDs which do not have a valid /proc/pid/exe symlink (e. g. kernel processes), the PID of our own process, and everything that is contained in the blacklist argument. ''' my_pid = os.getpid() my_sid = os.getsid(0) for d in os.listdir('/proc'): try: pid = int(d) except ValueError: continue if pid == 1 or pid == my_pid or d in blacklist: apport.warning('ignoring: %s', d) continue try: sid = os.getsid(pid) except OSError: # os.getsid() can fail with "No such process" if the process died # in the meantime continue if sid == my_sid: apport.warning('ignoring same sid: %s', d) continue try: os.readlink(os.path.join('/proc', d, 'exe')) except OSError as e: if e.errno == errno.ENOENT: # kernel thread or similar, silently ignore continue apport.warning('Could not read information about pid %s: %s', d, str(e)) continue yield d def do_report(pid, blacklist): '''Create a report for a particular PID.''' r = apport.Report('Bug') try: r.add_proc_info(pid) except (ValueError, AssertionError): # happens if ExecutablePath doesn't exist (any more?), ignore return r['Tags'] = 'shutdown-hang' r['Title'] = 'does not terminate at computer shutdown' if 'ExecutablePath' in r: r['Title'] = os.path.basename(r['ExecutablePath']) + ' ' + r['Title'] r['Processes'] = apport.hookutils.command_output(['ps', 'aux']) r['InitctlList'] = apport.hookutils.command_output(['initctl', 'list']) if blacklist: r['OmitPids'] = ' '.join(blacklist) try: with apport.fileutils.make_report_file(r) as f: r.write(f) except (IOError, OSError) as e: apport.fatal('Cannot create report: ' + str(e)) # # main # (opts, args) = parse_argv() for p in orphaned_processes(opts.blacklist): do_report(p, opts.blacklist)
Close