Linux server.edchosting.com 4.18.0-553.79.1.lve.el7h.x86_64 #1 SMP Wed Oct 15 16:34:46 UTC 2025 x86_64
LiteSpeed
Server IP : 75.98.162.185 & Your IP : 216.73.216.163
Domains :
Cant Read [ /etc/named.conf ]
User : goons4good
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
opt /
cloudlinux /
venv /
bin /
Delete
Unzip
Name
Size
Permission
Date
Action
Activate.ps1
8.82
KB
-rw-r--r--
2026-01-20 08:00
activate
1.65
KB
-rw-r--r--
2026-01-20 08:00
activate.csh
915
B
-rw-r--r--
2026-01-20 08:00
activate.fish
2.14
KB
-rw-r--r--
2026-01-20 08:00
alembic
202
B
-rwxr-xr-x
2026-01-20 08:00
cagefs_enter_site.py
1.83
KB
-rwxr-xr-x
2026-01-20 09:14
chardetect
210
B
-rwxr-xr-x
2026-01-20 08:00
cl_sysctl
4.51
KB
-rwxr-xr-x
2026-01-20 09:08
clcpapi
3.64
KB
-rwxr-xr-x
2026-01-20 09:08
coverage
204
B
-rwxr-xr-x
2026-01-20 08:00
coverage-3.11
204
B
-rwxr-xr-x
2026-01-20 08:00
coverage3
204
B
-rwxr-xr-x
2026-01-20 08:00
cpanel-dbmapping
3.83
KB
-rwxr-xr-x
2026-01-20 09:08
crontab-user-wrapper.py
2.46
KB
-rwxr-xr-x
2026-01-20 09:14
da_suid_caller.py
686
B
-rw-r--r--
2026-01-20 09:08
detect-requirements
211
B
-rwxr-xr-x
2026-01-20 08:00
dodgy
197
B
-rwxr-xr-x
2026-01-20 08:00
epylint
208
B
-rwxr-xr-x
2026-01-20 08:00
f2py
205
B
-rwxr-xr-x
2026-01-20 08:00
f2py3
205
B
-rwxr-xr-x
2026-01-20 08:00
f2py3.11
205
B
-rwxr-xr-x
2026-01-20 08:00
flake8
203
B
-rwxr-xr-x
2026-01-20 08:00
futurize
204
B
-rwxr-xr-x
2026-01-20 08:00
get_gprof
1.84
KB
-rwxr-xr-x
2026-01-20 08:00
get_objgraph
1.63
KB
-rwxr-xr-x
2026-01-20 08:00
isort
198
B
-rwxr-xr-x
2026-01-20 08:00
isort-identify-imports
232
B
-rwxr-xr-x
2026-01-20 08:00
jsonschema
202
B
-rwxr-xr-x
2026-01-20 08:00
lvestats_config_reader.py
1.12
KB
-rw-r--r--
2025-12-10 09:16
mako-render
202
B
-rwxr-xr-x
2026-01-20 08:00
normalizer
233
B
-rwxr-xr-x
2026-01-20 08:00
pasteurize
206
B
-rwxr-xr-x
2026-01-20 08:00
pip
237
B
-rwxr-xr-x
2026-01-20 08:00
pip3
237
B
-rwxr-xr-x
2026-01-20 08:00
pip3.11
237
B
-rwxr-xr-x
2026-01-20 08:00
plesk_suid_caller.py
905
B
-rw-r--r--
2026-01-20 09:08
prospector
202
B
-rwxr-xr-x
2026-01-20 08:00
py.test
210
B
-rwxr-xr-x
2026-01-20 08:00
pycodestyle
201
B
-rwxr-xr-x
2026-01-20 08:00
pydocstyle
202
B
-rwxr-xr-x
2026-01-20 08:00
pyflakes
200
B
-rwxr-xr-x
2026-01-20 08:00
pylint
206
B
-rwxr-xr-x
2026-01-20 08:00
pylint-config
222
B
-rwxr-xr-x
2026-01-20 08:00
pyreverse
212
B
-rwxr-xr-x
2026-01-20 08:00
pysemver
198
B
-rwxr-xr-x
2026-01-20 08:00
pytest
210
B
-rwxr-xr-x
2026-01-20 08:00
python
6.98
KB
-rwxr-xr-x
2026-01-07 17:06
python3
6.98
KB
-rwxr-xr-x
2026-01-07 17:06
python3.11
6.98
KB
-rwxr-xr-x
2026-01-07 17:06
raven
208
B
-rwxr-xr-x
2026-01-20 08:00
symilar
208
B
-rwxr-xr-x
2026-01-20 08:00
tap
196
B
-rwxr-xr-x
2026-01-20 08:00
tappy
196
B
-rwxr-xr-x
2026-01-20 08:00
undill
603
B
-rwxr-xr-x
2026-01-20 08:00
virtualenv
227
B
-rwxr-xr-x
2026-01-20 08:00
Save
Rename
#!/opt/cloudlinux/venv/bin/python3 -sbb # -*- coding: utf-8 -*- # # Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2025 All Rights Reserved # # Licensed under CLOUD LINUX LICENSE AGREEMENT # https://cloudlinux.com/docs/LICENCE.TXT # """ Execute a command inside CageFS for a site (document root or domain). This wrapper provides a command-line interface for executing commands within the isolated CageFS environment for a specific website. """ import argparse import os import sys from clcagefslib.webisolation import libenter def create_parser(): """ Create argument parser for cagefs_enter_site. Returns: argparse.ArgumentParser: Configured argument parser """ parser = argparse.ArgumentParser( # the command is named with _underscores_ to match # existing cagefs_enter wrapper from lvewrappers prog="cagefs_enter_site", description="Execute a command inside CageFS for a site (document root or domain)", ) parser.add_argument("site", type=str, help="Document root or domain") parser.add_argument( "command", type=str, nargs=argparse.REMAINDER, help="Command to execute" ) return parser def main(): """ Main entry point. Returns: int: Exit code """ parser = create_parser() args = parser.parse_args() if not args.command: parser.error("COMMAND is required") try: return libenter.enter_site(args.site, args.command) except ValueError as e: print(f"Error: {e}", file=sys.stderr) return 1 except KeyboardInterrupt: # Clean Ctrl+C exit without traceback (exit code 130 = SIGINT). return 130 if __name__ == "__main__": if os.geteuid() == 0: print("Error: This program can not be run as root", file=sys.stderr) sys.exit(1) sys.exit(main())