Linux cyberpanel 5.15.0-156-generic #166-Ubuntu SMP Sat Aug 9 00:02:46 UTC 2025 x86_64
LiteSpeed
: 160.191.175.3 | : 216.73.216.114
Cant Read [ /etc/named.conf ]
8.2.29
aodai6801
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
initramfs-tools /
hooks /
[ HOME SHELL ]
Name
Size
Permission
Action
amd64_microcode
3.77
KB
-rwxr-xr-x
bcache
543
B
-rwxr-xr-x
btrfs
701
B
-rwxr-xr-x
cloud-initramfs-dyn-netconf
118
B
-rwxr-xr-x
console_setup
3.07
KB
-rwxr-xr-x
copymods
280
B
-rwxr-xr-x
cryptgnupg
958
B
-rwxr-xr-x
cryptgnupg-sc
2.19
KB
-rwxr-xr-x
cryptkeyctl
457
B
-rwxr-xr-x
cryptopensc
1.48
KB
-rwxr-xr-x
cryptpassdev
888
B
-rwxr-xr-x
cryptroot
15
KB
-rwxr-xr-x
cryptroot-unlock
1010
B
-rwxr-xr-x
dmsetup
506
B
-rwxr-xr-x
fixrtc
436
B
-rwxr-xr-x
framebuffer
579
B
-rwxr-xr-x
fsck
2.06
KB
-rwxr-xr-x
fuse
231
B
-rwxr-xr-x
intel_microcode
4.83
KB
-rwxr-xr-x
iscsi
732
B
-rwxr-xr-x
kbd
301
B
-rwxr-xr-x
klibc-utils
646
B
-rwxr-xr-x
kmod
432
B
-rwxr-xr-x
linux-firmware
865
B
-rwxr-xr-x
lvm2
691
B
-rwxr-xr-x
mdadm
2.91
KB
-rwxr-xr-x
ntfs_3g
304
B
-rwxr-xr-x
overlayroot
732
B
-rwxr-xr-x
plymouth
5.69
KB
-rwxr-xr-x
resume
3.04
KB
-rwxr-xr-x
sg3-utils
485
B
-rwxr-xr-x
thermal
1.29
KB
-rwxr-xr-x
thin-provisioning-tools
369
B
-rwxr-xr-x
udev
1.69
KB
-rwxr-xr-x
xfs
850
B
-rwxr-xr-x
zz-busybox-initramfs
2.18
KB
-rwxr-xr-x
zz-dhclient
478
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : cryptgnupg-sc
#!/bin/sh set -e PREREQ="cryptroot" prereqs() { echo "$PREREQ" } case "$1" in prereqs) prereqs exit 0 ;; esac . /usr/share/initramfs-tools/hook-functions . /lib/cryptsetup/functions if [ ! -x "$DESTDIR/lib/cryptsetup/scripts/decrypt_gnupg-sc" ] || [ ! -f "$TABFILE" ]; then exit 0 fi # Hooks for loading gnupg software and encrypted key into the initramfs copy_keys() { crypttab_parse_options if [ "${CRYPTTAB_OPTION_keyscript-}" = "/lib/cryptsetup/scripts/decrypt_gnupg-sc" ]; then if [ -f "$CRYPTTAB_KEY" ]; then [ -f "$DESTDIR$CRYPTTAB_KEY" ] || copy_file keyfile "$CRYPTTAB_KEY" || RV=$? else cryptsetup_message "ERROR: Target $CRYPTTAB_NAME has a non-existing key file $CRYPTTAB_KEY" RV=1 fi fi } RV=0 crypttab_foreach_entry copy_keys PUBRING="/etc/cryptsetup-initramfs/pubring.gpg" if [ ! -f "$PUBRING" ]; then cryptsetup_message "WARNING: $PUBRING: No such file" else [ -d "$DESTDIR/cryptroot/gnupghome" ] || mkdir -pm0700 "$DESTDIR/cryptroot/gnupghome" # let gpg(1) create the keyring on the fly; we're not relying on its # internals since it's the very same binary we're copying to the # initramfs /usr/bin/gpg --no-options --no-autostart --trust-model=always \ --quiet --batch --no-tty --logger-file=/dev/null \ --homedir="$DESTDIR/cryptroot/gnupghome" --import <"$PUBRING" # make sure not to clutter the initramfs with backup keyrings find "$DESTDIR/cryptroot" -name "*~" -type f -delete fi copy_exec /usr/bin/gpg copy_exec /usr/bin/gpg-agent copy_exec /usr/lib/gnupg/scdaemon copy_exec /usr/bin/gpgconf copy_exec /usr/bin/gpg-connect-agent if [ ! -x "$DESTDIR/usr/bin/pinentry" ]; then if [ -x "/usr/bin/pinentry-curses" ]; then pinentry="/usr/bin/pinentry-curses" elif [ -x "/usr/bin/pinentry-tty" ]; then pinentry="/usr/bin/pinentry-tty" else cryptsetup_message "ERROR: missing required binary pinentry-curses or pinentry-tty" RV=1 fi copy_exec "$pinentry" ln -s "$pinentry" "$DESTDIR/usr/bin/pinentry" fi [ -f "$DESTDIR/lib/terminfo/l/linux" ] || copy_file terminfo /lib/terminfo/l/linux || RV=$? exit $RV
Close