SILENT KILLERPanel

Current Path: > > > > sbin


Operation   : Linux premium107.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
Software     : Apache
Server IP    : 198.54.126.246 | Your IP: 216.73.216.181
Domains      : 1034 Domain(s)
Permission   : [ 0555 ]

Files and Folders in: ////sbin

NameTypeSizeLast ModifiedActions
cagefs_enter_site File 1877 bytes January 20 2026 14:23:49.
chroot File 42440 bytes December 18 2025 13:54:40.
cloudlinux-selector File 654 bytes December 15 2025 14:07:47.
consoletype File 12160 bytes November 10 2025 10:42:43.
cracklib-check File 13360 bytes October 12 2019 00:47:15.
cracklib-format File 251 bytes October 12 2019 00:47:14.
cracklib-packer File 13368 bytes October 12 2019 00:47:15.
cracklib-unpacker File 9248 bytes October 12 2019 00:47:15.
create-cracklib-dict File 990 bytes October 12 2019 00:47:14.
cxs File 1278 bytes July 31 2025 08:35:30.
ddns-confgen File 20944 bytes November 06 2025 07:45:52.
dnssec-checkds File 936 bytes November 06 2025 07:45:45.
dnssec-coverage File 938 bytes November 06 2025 07:45:45.
dnssec-dsfromkey File 62304 bytes November 06 2025 07:45:52.
dnssec-importkey File 62304 bytes November 06 2025 07:45:52.
dnssec-keyfromlabel File 66312 bytes November 06 2025 07:45:52.
dnssec-keygen File 74592 bytes November 06 2025 07:45:52.
dnssec-keymgr File 934 bytes November 06 2025 07:45:45.
dnssec-revoke File 58104 bytes November 06 2025 07:45:52.
dnssec-settime File 62296 bytes November 06 2025 07:45:52.
dnssec-signzone File 120016 bytes November 06 2025 07:45:52.
dnssec-verify File 54112 bytes November 06 2025 07:45:52.
exim File 1280 bytes December 17 2025 16:20:20.
faillock File 21016 bytes December 17 2025 18:54:08.
genrandom File 12672 bytes November 06 2025 07:45:52.
ip File 709944 bytes May 23 2024 08:36:03.
isc-hmac-fixup File 12136 bytes November 06 2025 07:45:52.
ldconfig File 1009752 bytes December 08 2025 09:43:19.
mkhomedir_helper File 25024 bytes December 17 2025 18:54:08.
named-checkzone File 37512 bytes November 06 2025 07:45:52.
named-compilezone File 37512 bytes November 06 2025 07:45:52.
nsec3hash File 12584 bytes November 06 2025 07:45:52.
pam_console_apply File 46280 bytes December 17 2025 18:54:08.
pam_timestamp_check File 12152 bytes December 17 2025 18:54:08.
pluginviewer File 21064 bytes February 23 2022 20:13:56.
proxyexec File 21680 bytes September 02 2020 07:49:11.
pwhistory_helper File 20928 bytes December 17 2025 18:54:08.
saslauthd File 96688 bytes February 23 2022 20:13:56.
sasldblistusers2 File 21264 bytes February 23 2022 20:13:56.
saslpasswd2 File 16816 bytes February 23 2022 20:13:56.
sendmail File 1288 bytes December 17 2025 16:20:20.
testsaslauthd File 17056 bytes February 23 2022 20:13:56.
tmpwatch File 36320 bytes October 12 2019 11:32:29.
tsig-keygen File 20944 bytes November 06 2025 07:45:52.
unix_chkpwd File 37744 bytes December 17 2025 18:54:08.
unix_update File 37744 bytes December 17 2025 18:54:08.

Reading File: ////sbin/cagefs_enter_site

#!/opt/cloudlinux/venv/bin/python3 -sbb
# -*- coding: utf-8 -*-
#
# Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2025 All Rights Reserved
#
# Licensed under CLOUD LINUX LICENSE AGREEMENT
# https://cloudlinux.com/docs/LICENCE.TXT
#
"""
Execute a command inside CageFS for a site (document root or domain).

This wrapper provides a command-line interface for executing commands within
the isolated CageFS environment for a specific website.
"""

import argparse
import os
import sys

from clcagefslib.webisolation import libenter


def create_parser():
    """
    Create argument parser for cagefs_enter_site.

    Returns:
        argparse.ArgumentParser: Configured argument parser
    """
    parser = argparse.ArgumentParser(
        # the command is named with _underscores_ to match
        # existing cagefs_enter wrapper from lvewrappers
        prog="cagefs_enter_site",
        description="Execute a command inside CageFS for a site (document root or domain)",
    )

    parser.add_argument("site", type=str, help="Document root or domain")

    parser.add_argument(
        "command", type=str, nargs=argparse.REMAINDER, help="Command to execute"
    )

    return parser


def main():
    """
    Main entry point.

    Returns:
        int: Exit code
    """
    parser = create_parser()
    args = parser.parse_args()

    if not args.command:
        parser.error("COMMAND is required")

    try:
        return libenter.enter_site(args.site, args.command)
    except ValueError as e:
        print(f"Error: {e}", file=sys.stderr)
        return 1
    except KeyboardInterrupt:
        # Clean Ctrl+C exit without traceback (exit code 130 = SIGINT).
        return 130


if __name__ == "__main__":
    if os.geteuid() == 0:
        print("Error: This program can not be run as root", file=sys.stderr)
        sys.exit(1)

    sys.exit(main())

SILENT KILLER Tool