OXIESEC PANEL
- Current Dir:
/
/
etc
/
alternatives
Server IP: 2a02:4780:11:1594:0:ef5:22d7:a
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
11/14/2025 09:37:30 PM
rwxr-xr-x
📄
apropos
-
-
---------
📄
apropos.1.gz
2.65 KB
04/10/2023 04:47:33 PM
rw-r--r--
📄
arptables
-
-
---------
📄
arptables-helper
-
-
---------
📄
arptables-man
4.39 KB
02/04/2025 03:47:05 AM
rw-r--r--
📄
arptables-restore
-
-
---------
📄
arptables-restore-man
935 bytes
02/04/2025 03:47:05 AM
rw-r--r--
📄
arptables-save
-
-
---------
📄
arptables-save-man
1.08 KB
02/04/2025 03:47:05 AM
rw-r--r--
📄
cifs-idmap-plugin
14.93 KB
12/26/2024 08:58:22 AM
rwxr-xr-x
📄
ebtables
-
-
---------
📄
ebtables-man
11.97 KB
02/04/2025 03:47:05 AM
rw-r--r--
📄
ebtables-restore
-
-
---------
📄
ebtables-save
-
-
---------
📄
ip6tables
-
-
---------
📄
ip6tables-restore
-
-
---------
📄
ip6tables-save
-
-
---------
📄
iptables
-
-
---------
📄
iptables-restore
-
-
---------
📄
iptables-save
-
-
---------
📄
ld
1.7 MB
10/03/2024 05:16:41 AM
rwxr-xr-x
📄
libnssckbi.so.x86_64
242.63 KB
12/17/2024 11:04:31 AM
rwxr-xr-x
📄
man
-
-
---------
📄
man.1.gz
11.33 KB
04/10/2023 04:47:33 PM
rw-r--r--
📄
modulecmd
654.01 KB
09/27/2023 03:12:38 PM
rwxr-xr-x
📄
modules.csh
109 bytes
09/27/2023 03:12:38 PM
rw-r--r--
📄
modules.sh
479 bytes
09/27/2023 03:12:38 PM
rw-r--r--
📄
mta
1.02 KB
03/26/2025 03:16:01 PM
rwxr-xr-x
📄
mta-mailq
-
-
---------
📄
mta-mailqman
26.56 KB
03/26/2025 03:15:59 PM
rw-r--r--
📄
mta-newaliases
-
-
---------
📄
mta-pam
-
-
---------
📄
mta-rmail
-
-
---------
📄
mta-rsmtp
-
-
---------
📄
mta-runq
-
-
---------
📄
mta-sendmail
1.02 KB
03/26/2025 03:16:01 PM
rwxr-xr-x
📄
nc
-
-
---------
📄
nc-man
10.66 KB
10/02/2024 07:32:07 PM
rw-r--r--
📄
qtchooser-5
-
-
---------
📄
qtchooser-default
-
-
---------
📄
soelim
-
-
---------
📄
soelim.1.gz
1.89 KB
02/01/2022 10:44:38 AM
rw-r--r--
📄
whatis
-
-
---------
📄
whatis.1.gz
2.49 KB
04/10/2023 04:47:33 PM
rw-r--r--
Editing: mta
Close
#!/usr/bin/bash ##CageFS proxyexec wrapper - ver 16 if [[ $EUID -eq 0 ]]; then echo 'Cannot be run as root' exit 1 fi USR=`/usr/bin/whoami` TOKEN=`/bin/cat /var/.cagefs/.cagefs.token` # It's user's tmp directory and write to it is secure procedure # because this script is running only under usual user PIDFILE="/tmp/.cagefs.proxy.$$" USER_INTERRUPT=13 CWD=`pwd` ctrl_c_handler() { if [[ -f "$PIDFILE" ]]; then pid=`/bin/cat $PIDFILE` /bin/rm -f $PIDFILE > /dev/null 2>&1 /bin/kill -s SIGINT "$pid" > /dev/null 2>&1 fi exit $USER_INTERRUPT } if [[ -e /var/.cagefs/origin ]]; then ORIGIN=`/bin/cat /var/.cagefs/origin` REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN" $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" EXIM $$ "$@" RETVAL=$? else trap 'ctrl_c_handler' 2 CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" EXIM $$ "$@" RETVAL=$? /bin/rm -f $PIDFILE > /dev/null 2>&1 fi exit $RETVAL