Linux server64.web-hosting.com 4.18.0-513.18.1.lve.el8.x86_64 #1 SMP Thu Feb 22 12:55:50 UTC 2024 x86_64
LiteSpeed
Server IP : 198.54.116.248 & Your IP : 216.73.216.104
Domains :
Cant Read [ /etc/named.conf ]
User : tailxcij
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
opt /
cloudlinux /
venv /
bin /
Delete
Unzip
Name
Size
Permission
Date
Action
Activate.ps1
8.82
KB
-rw-r--r--
2026-01-20 13:01
activate
1.65
KB
-rw-r--r--
2026-01-20 13:01
activate.csh
915
B
-rw-r--r--
2026-01-20 13:01
activate.fish
2.14
KB
-rw-r--r--
2026-01-20 13:01
alembic
202
B
-rwxr-xr-x
2026-01-20 13:01
cagefs_enter_site.py
1.83
KB
-rwxr-xr-x
2026-01-20 14:23
chardetect
210
B
-rwxr-xr-x
2026-01-20 13:01
cl_sysctl
4.51
KB
-rwxr-xr-x
2026-01-20 14:17
clcpapi
3.64
KB
-rwxr-xr-x
2026-01-20 14:17
coverage
204
B
-rwxr-xr-x
2026-01-20 13:01
coverage-3.11
204
B
-rwxr-xr-x
2026-01-20 13:01
coverage3
204
B
-rwxr-xr-x
2026-01-20 13:01
cpanel-dbmapping
3.83
KB
-rwxr-xr-x
2026-01-20 14:17
crontab-user-wrapper.py
2.46
KB
-rwxr-xr-x
2026-01-20 14:23
da_suid_caller.py
686
B
-rw-r--r--
2026-01-20 14:17
detect-requirements
211
B
-rwxr-xr-x
2026-01-20 13:01
dodgy
197
B
-rwxr-xr-x
2026-01-20 13:01
epylint
208
B
-rwxr-xr-x
2026-01-20 13:01
f2py
205
B
-rwxr-xr-x
2026-01-20 13:01
f2py3
205
B
-rwxr-xr-x
2026-01-20 13:01
f2py3.11
205
B
-rwxr-xr-x
2026-01-20 13:01
flake8
203
B
-rwxr-xr-x
2026-01-20 13:01
futurize
204
B
-rwxr-xr-x
2026-01-20 13:01
get_gprof
1.84
KB
-rwxr-xr-x
2026-01-20 13:01
get_objgraph
1.63
KB
-rwxr-xr-x
2026-01-20 13:01
isort
198
B
-rwxr-xr-x
2026-01-20 13:01
isort-identify-imports
232
B
-rwxr-xr-x
2026-01-20 13:01
jsonschema
202
B
-rwxr-xr-x
2026-01-20 13:01
lvestats_config_reader.py
1.12
KB
-rw-r--r--
2025-12-10 14:14
mako-render
202
B
-rwxr-xr-x
2026-01-20 13:01
normalizer
233
B
-rwxr-xr-x
2026-01-20 13:01
pasteurize
206
B
-rwxr-xr-x
2026-01-20 13:01
pip
237
B
-rwxr-xr-x
2026-01-20 13:01
pip3
237
B
-rwxr-xr-x
2026-01-20 13:01
pip3.11
237
B
-rwxr-xr-x
2026-01-20 13:01
plesk_suid_caller.py
905
B
-rw-r--r--
2026-01-20 14:17
prospector
202
B
-rwxr-xr-x
2026-01-20 13:01
py.test
210
B
-rwxr-xr-x
2026-01-20 13:01
pycodestyle
201
B
-rwxr-xr-x
2026-01-20 13:01
pydocstyle
202
B
-rwxr-xr-x
2026-01-20 13:01
pyflakes
200
B
-rwxr-xr-x
2026-01-20 13:01
pylint
206
B
-rwxr-xr-x
2026-01-20 13:01
pylint-config
222
B
-rwxr-xr-x
2026-01-20 13:01
pyreverse
212
B
-rwxr-xr-x
2026-01-20 13:01
pysemver
198
B
-rwxr-xr-x
2026-01-20 13:01
pytest
210
B
-rwxr-xr-x
2026-01-20 13:01
python
15.59
KB
-rwxr-xr-x
2026-01-07 22:45
python3
15.59
KB
-rwxr-xr-x
2026-01-07 22:45
python3.11
15.59
KB
-rwxr-xr-x
2026-01-07 22:45
raven
208
B
-rwxr-xr-x
2026-01-20 13:01
symilar
208
B
-rwxr-xr-x
2026-01-20 13:01
tap
196
B
-rwxr-xr-x
2026-01-20 13:01
tappy
196
B
-rwxr-xr-x
2026-01-20 13:01
undill
603
B
-rwxr-xr-x
2026-01-20 13:01
virtualenv
227
B
-rwxr-xr-x
2026-01-20 13:01
Save
Rename
#!/opt/cloudlinux/venv/bin/python3 -sbb # -*- coding: utf-8 -*- # # Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2025 All Rights Reserved # # Licensed under CLOUD LINUX LICENSE AGREEMENT # https://cloudlinux.com/docs/LICENCE.TXT # """ Execute a command inside CageFS for a site (document root or domain). This wrapper provides a command-line interface for executing commands within the isolated CageFS environment for a specific website. """ import argparse import os import sys from clcagefslib.webisolation import libenter def create_parser(): """ Create argument parser for cagefs_enter_site. Returns: argparse.ArgumentParser: Configured argument parser """ parser = argparse.ArgumentParser( # the command is named with _underscores_ to match # existing cagefs_enter wrapper from lvewrappers prog="cagefs_enter_site", description="Execute a command inside CageFS for a site (document root or domain)", ) parser.add_argument("site", type=str, help="Document root or domain") parser.add_argument( "command", type=str, nargs=argparse.REMAINDER, help="Command to execute" ) return parser def main(): """ Main entry point. Returns: int: Exit code """ parser = create_parser() args = parser.parse_args() if not args.command: parser.error("COMMAND is required") try: return libenter.enter_site(args.site, args.command) except ValueError as e: print(f"Error: {e}", file=sys.stderr) return 1 except KeyboardInterrupt: # Clean Ctrl+C exit without traceback (exit code 130 = SIGINT). return 130 if __name__ == "__main__": if os.geteuid() == 0: print("Error: This program can not be run as root", file=sys.stderr) sys.exit(1) sys.exit(main())