Linux server.edchosting.com 4.18.0-553.79.1.lve.el7h.x86_64 #1 SMP Wed Oct 15 16:34:46 UTC 2025 x86_64
LiteSpeed
Server IP : 75.98.162.185 & Your IP : 216.73.216.163
Domains :
Cant Read [ /etc/named.conf ]
User : goons4good
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
sbin /
Delete
Unzip
Name
Size
Permission
Date
Action
cagefs_enter_site
1.83
KB
-rwxr-xr-x
2026-01-20 09:14
chroot
32.48
KB
-rwxr-xr-x
2020-11-16 17:24
cloudlinux-selector
654
B
-rwxr-xr-x
2025-12-15 09:11
consoletype
6.95
KB
-rwxr-xr-x
2022-08-16 09:41
cracklib-check
7.04
KB
-rwxr-xr-x
2014-06-10 01:42
cracklib-format
246
B
-rwxr-xr-x
2014-06-10 01:42
cracklib-packer
11.06
KB
-rwxr-xr-x
2014-06-10 01:42
cracklib-unpacker
7.02
KB
-rwxr-xr-x
2014-06-10 01:42
create-cracklib-dict
990
B
-rwxr-xr-x
2014-06-10 01:42
exim
1.25
KB
-rwxr-xr-x
2025-12-23 12:28
faillock
15.02
KB
-rwxr-xr-x
2025-09-10 10:56
ip
579.2
KB
-rwxr-xr-x
2021-07-05 06:05
ldconfig
952.08
KB
-rwxr-xr-x
2025-09-18 06:21
mkhomedir_helper
19.05
KB
-rwxr-xr-x
2025-09-10 10:56
pam_console_apply
39.69
KB
-rwxr-xr-x
2025-09-10 10:56
pam_tally2
15.05
KB
-rwxr-xr-x
2025-09-10 10:56
pam_timestamp_check
10.97
KB
-rwxr-xr-x
2025-09-10 10:56
pluginviewer
15.23
KB
-rwxr-xr-x
2022-02-25 02:00
proxyexec
19.82
KB
-r-xr-xr-x
2026-02-10 03:53
pwhistory_helper
15.44
KB
-rwxr-xr-x
2025-09-10 10:56
safe_finger
11.08
KB
-rwxr-xr-x
2014-06-10 00:41
saslauthd
92.59
KB
-rwxr-xr-x
2022-02-25 02:00
sasldblistusers2
19.26
KB
-rwxr-xr-x
2022-02-25 02:00
saslpasswd2
15.09
KB
-rwxr-xr-x
2022-02-25 02:00
sendmail
1.26
KB
-rwxr-xr-x
2025-12-23 12:28
snmpd
31.05
KB
-rwxr-xr-x
2024-01-25 10:55
snmptrapd
31.22
KB
-rwxr-xr-x
2024-01-25 10:55
tcpd
36.62
KB
-rwxr-xr-x
2014-06-10 00:41
tcpdmatch
40.83
KB
-rwxr-xr-x
2014-06-10 00:41
testsaslauthd
15.09
KB
-rwxr-xr-x
2022-02-25 02:00
tmpwatch
27.87
KB
-rwxr-xr-x
2019-08-08 22:58
try-from
23.47
KB
-rwxr-xr-x
2014-06-10 00:41
unix_chkpwd
35.43
KB
-rwxr-xr-x
2025-09-10 10:56
unix_update
35.42
KB
-rwx------
2025-09-10 10:56
Save
Rename
#!/opt/cloudlinux/venv/bin/python3 -sbb # -*- coding: utf-8 -*- # # Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2025 All Rights Reserved # # Licensed under CLOUD LINUX LICENSE AGREEMENT # https://cloudlinux.com/docs/LICENCE.TXT # """ Execute a command inside CageFS for a site (document root or domain). This wrapper provides a command-line interface for executing commands within the isolated CageFS environment for a specific website. """ import argparse import os import sys from clcagefslib.webisolation import libenter def create_parser(): """ Create argument parser for cagefs_enter_site. Returns: argparse.ArgumentParser: Configured argument parser """ parser = argparse.ArgumentParser( # the command is named with _underscores_ to match # existing cagefs_enter wrapper from lvewrappers prog="cagefs_enter_site", description="Execute a command inside CageFS for a site (document root or domain)", ) parser.add_argument("site", type=str, help="Document root or domain") parser.add_argument( "command", type=str, nargs=argparse.REMAINDER, help="Command to execute" ) return parser def main(): """ Main entry point. Returns: int: Exit code """ parser = create_parser() args = parser.parse_args() if not args.command: parser.error("COMMAND is required") try: return libenter.enter_site(args.site, args.command) except ValueError as e: print(f"Error: {e}", file=sys.stderr) return 1 except KeyboardInterrupt: # Clean Ctrl+C exit without traceback (exit code 130 = SIGINT). return 130 if __name__ == "__main__": if os.geteuid() == 0: print("Error: This program can not be run as root", file=sys.stderr) sys.exit(1) sys.exit(main())