OXIESEC PANEL
- Current Dir:
/
/
etc
/
alternatives
Server IP: 2a02:4780:11:1084:0:327f:3464:10
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
08/20/2025 09:37:17 PM
rwxr-xr-x
📄
cifs-idmap-plugin
11.48 KB
12/17/2024 02:23:34 PM
rwxr-xr-x
📄
easy_install-3
0 bytes
01/01/1970 12:00:00 AM
---------
📄
ifdown
0 bytes
01/01/1970 12:00:00 AM
---------
📄
ifup
0 bytes
01/01/1970 12:00:00 AM
---------
📄
ld
1.71 MB
11/15/2024 09:59:32 AM
rwxr-xr-x
📄
libnssckbi.so.x86_64
249.24 KB
04/06/2024 02:16:19 PM
rwxr-xr-x
📄
module.1.gz
15.14 KB
10/14/2023 06:46:13 PM
rw-r--r--
📄
modulecmd
384.75 KB
10/14/2023 06:46:13 PM
rwxr-xr-x
📄
modulefile.4.gz
10.05 KB
10/14/2023 06:46:13 PM
rw-r--r--
📄
modules.csh
105 bytes
10/14/2023 06:46:13 PM
rw-r--r--
📄
modules.sh
448 bytes
10/14/2023 06:46:13 PM
rw-r--r--
📄
mta
1.02 KB
07/22/2024 12:07:10 PM
rwxr-xr-x
📄
mta-mailq
0 bytes
01/01/1970 12:00:00 AM
---------
📄
mta-mailqman
26.53 KB
07/22/2024 12:07:09 PM
rw-r--r--
📄
mta-newaliases
0 bytes
01/01/1970 12:00:00 AM
---------
📄
mta-pam
0 bytes
01/01/1970 12:00:00 AM
---------
📄
mta-rmail
0 bytes
01/01/1970 12:00:00 AM
---------
📄
mta-rsmtp
0 bytes
01/01/1970 12:00:00 AM
---------
📄
mta-runq
0 bytes
01/01/1970 12:00:00 AM
---------
📄
mta-sendmail
1.02 KB
07/22/2024 12:07:10 PM
rwxr-xr-x
📄
ncman
10.66 KB
10/14/2023 10:25:17 PM
rw-r--r--
📄
nmap
0 bytes
01/01/1970 12:00:00 AM
---------
📄
pip-3
0 bytes
01/01/1970 12:00:00 AM
---------
📄
pip3
0 bytes
01/01/1970 12:00:00 AM
---------
📄
pydoc-3
0 bytes
01/01/1970 12:00:00 AM
---------
📄
pydoc3
0 bytes
01/01/1970 12:00:00 AM
---------
📄
python
0 bytes
01/01/1970 12:00:00 AM
---------
📄
python3
11.59 KB
12/05/2024 01:10:21 PM
rwxr-xr-x
📄
python3-config
0 bytes
01/01/1970 12:00:00 AM
---------
📄
python3-man
5.1 KB
12/23/2018 09:37:14 PM
rw-r--r--
📄
pyvenv-3
0 bytes
01/01/1970 12:00:00 AM
---------
📄
qtchooser-5
0 bytes
01/01/1970 12:00:00 AM
---------
📄
qtchooser-default
0 bytes
01/01/1970 12:00:00 AM
---------
📄
unversioned-python-man
603 bytes
12/05/2024 01:10:18 PM
rw-r--r--
Editing: mta-sendmail
Close
#!/bin/bash ##CageFS proxyexec wrapper - ver 16 if [[ $EUID -eq 0 ]]; then echo 'Cannot be run as root' exit 1 fi USR=`/usr/bin/whoami` TOKEN=`/bin/cat /var/.cagefs/.cagefs.token` # It's user's tmp directory and write to it is secure procedure # because this script is running only under usual user PIDFILE="/tmp/.cagefs.proxy.$$" USER_INTERRUPT=13 CWD=`pwd` ctrl_c_handler() { if [[ -f "$PIDFILE" ]]; then pid=`/bin/cat $PIDFILE` /bin/rm -f $PIDFILE > /dev/null 2>&1 /bin/kill -s SIGINT "$pid" > /dev/null 2>&1 fi exit $USER_INTERRUPT } if [[ -e /var/.cagefs/origin ]]; then ORIGIN=`/bin/cat /var/.cagefs/origin` REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN" $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" EXIM $$ "$@" RETVAL=$? else trap 'ctrl_c_handler' 2 CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" EXIM $$ "$@" RETVAL=$? /bin/rm -f $PIDFILE > /dev/null 2>&1 fi exit $RETVAL