SILENT KILLERPanel

Current Path: > > usr > sbin


Operation   : Linux premium107.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
Software     : Apache
Server IP    : 198.54.126.246 | Your IP: 216.73.216.181
Domains      : 1034 Domain(s)
Permission   : [ 0555 ]

Files and Folders in: //usr/sbin

NameTypeSizeLast ModifiedActions
cagefs_enter_site File 1877 bytes January 20 2026 14:23:49.
chroot File 42440 bytes December 18 2025 13:54:40.
cloudlinux-selector File 654 bytes December 15 2025 14:07:47.
consoletype File 12160 bytes November 10 2025 10:42:43.
cracklib-check File 13360 bytes October 12 2019 00:47:15.
cracklib-format File 251 bytes October 12 2019 00:47:14.
cracklib-packer File 13368 bytes October 12 2019 00:47:15.
cracklib-unpacker File 9248 bytes October 12 2019 00:47:15.
create-cracklib-dict File 990 bytes October 12 2019 00:47:14.
cxs File 1278 bytes July 31 2025 08:35:30.
ddns-confgen File 20944 bytes November 06 2025 07:45:52.
dnssec-checkds File 936 bytes November 06 2025 07:45:45.
dnssec-coverage File 938 bytes November 06 2025 07:45:45.
dnssec-dsfromkey File 62304 bytes November 06 2025 07:45:52.
dnssec-importkey File 62304 bytes November 06 2025 07:45:52.
dnssec-keyfromlabel File 66312 bytes November 06 2025 07:45:52.
dnssec-keygen File 74592 bytes November 06 2025 07:45:52.
dnssec-keymgr File 934 bytes November 06 2025 07:45:45.
dnssec-revoke File 58104 bytes November 06 2025 07:45:52.
dnssec-settime File 62296 bytes November 06 2025 07:45:52.
dnssec-signzone File 120016 bytes November 06 2025 07:45:52.
dnssec-verify File 54112 bytes November 06 2025 07:45:52.
exim File 1280 bytes December 17 2025 16:20:20.
faillock File 21016 bytes December 17 2025 18:54:08.
genrandom File 12672 bytes November 06 2025 07:45:52.
ip File 709944 bytes May 23 2024 08:36:03.
isc-hmac-fixup File 12136 bytes November 06 2025 07:45:52.
ldconfig File 1009752 bytes December 08 2025 09:43:19.
mkhomedir_helper File 25024 bytes December 17 2025 18:54:08.
named-checkzone File 37512 bytes November 06 2025 07:45:52.
named-compilezone File 37512 bytes November 06 2025 07:45:52.
nsec3hash File 12584 bytes November 06 2025 07:45:52.
pam_console_apply File 46280 bytes December 17 2025 18:54:08.
pam_timestamp_check File 12152 bytes December 17 2025 18:54:08.
pluginviewer File 21064 bytes February 23 2022 20:13:56.
proxyexec File 21680 bytes September 02 2020 07:49:11.
pwhistory_helper File 20928 bytes December 17 2025 18:54:08.
saslauthd File 96688 bytes February 23 2022 20:13:56.
sasldblistusers2 File 21264 bytes February 23 2022 20:13:56.
saslpasswd2 File 16816 bytes February 23 2022 20:13:56.
sendmail File 1288 bytes December 17 2025 16:20:20.
testsaslauthd File 17056 bytes February 23 2022 20:13:56.
tmpwatch File 36320 bytes October 12 2019 11:32:29.
tsig-keygen File 20944 bytes November 06 2025 07:45:52.
unix_chkpwd File 37744 bytes December 17 2025 18:54:08.
unix_update File 37744 bytes December 17 2025 18:54:08.

Reading File: //usr/sbin/cxs

#!/bin/bash
##CageFS proxyexec wrapper - ver 17

if [[ $EUID -eq 0 ]]; then
    echo 'Cannot be run as root'
    exit 1
fi

USR=`/usr/bin/whoami`
USER_TOKEN_PATH="/var/.cagefs/.cagefs.token"
WEBSITE_ISOLATION_FLAG="/opt/cloudlinux/flags/enabled-flags.d/website-isolation.flag"
if [[ -f "$WEBSITE_ISOLATION_FLAG" && -n "$WEBSITE_TOKEN_PATH" ]]; then
    USER_TOKEN_PATH="$WEBSITE_TOKEN_PATH"
fi
TOKEN=`/bin/cat ${USER_TOKEN_PATH}`
# It's user's tmp directory and write to it is secure procedure
# because this script is running only under usual user
PIDFILE="/tmp/.cagefs.proxy.$$"
USER_INTERRUPT=13
CWD=`pwd`

ctrl_c_handler() {
    if [[ -f "$PIDFILE" ]]; then
        pid=`/bin/cat $PIDFILE`
        /bin/rm -f $PIDFILE > /dev/null 2>&1
        /bin/kill -s SIGINT "$pid" > /dev/null 2>&1
    fi
    exit $USER_INTERRUPT
}

if [[ -e /var/.cagefs/origin ]]; then
    ORIGIN=`/bin/cat /var/.cagefs/origin`
    REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN"
    $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" CXS $$ "$@"
    RETVAL=$?
else
    trap 'ctrl_c_handler' 2
    CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" CXS $$ "$@"
    RETVAL=$?
    /bin/rm -f $PIDFILE > /dev/null 2>&1
fi

exit $RETVAL

SILENT KILLER Tool