? Fallagassrini

Fallagassrini Bypass Shell

echo"
Fallagassrini
";
Current Path : /proc/self/root/scripts/

Linux gator3171.hostgator.com 4.19.286-203.ELK.el7.x86_64 #1 SMP Wed Jun 14 04:33:55 CDT 2023 x86_64
Upload File :
Current File : //proc/self/root/scripts/oopscheck

#!/usr/local/cpanel/3rdparty/bin/perl

# cpanel - scripts/oopscheck                       Copyright 2022 cPanel, L.L.C.
#                                                           All rights reserved.
# copyright@cpanel.net                                         http://cpanel.net
# This code is subject to the cPanel license. Unauthorized copying is prohibited

use strict;

my $inoops = 0;
my @DMESG  = split( /\n/, `dmesg` );
my $oops   = '';
foreach (@DMESG) {
    s/[\n\r]//g;
    if ( /^EIP/ || ( ( /invalid operand: /i || /Unable to handle/i ) && !/^PCI/ ) ) {
        $inoops = 1;
    }
    if ($inoops) {
        $oops .= $_ . "\n";
    }
    if (/^code:/i) {
        $inoops = 0;
    }
}

# Uncomment to test
# $oops = "test";

if ( length $oops ) {

    require Cpanel::Notify;
    Cpanel::Notify::notification_class(
        'class'            => 'Check::Oops',
        'application'      => 'Check::Oops',
        'constructor_args' => [
            'origin'       => 'oopscheck',
            'attach_files' => [ { 'name' => 'oops_log.txt', 'content' => \$oops } ],
        ]
    );
    print "Oops detected .. sent email\n";
}

bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped)
Email: contact@elmoujehidin.net