OXIESEC PANEL
- Current Dir:
/
/
lib
Server IP: 103.185.75.71
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
08/31/2025 03:46:12 PM
rwxr-xr-x
📁
.build-id
-
03/10/2026 02:52:11 PM
rwxr-xr-x
📁
NetworkManager
-
11/05/2025 08:57:57 AM
rwxr-xr-x
📁
binfmt.d
-
11/04/2025 12:03:24 PM
rwxr-xr-x
📄
cpp
1.04 MB
02/12/2025 01:11:11 PM
rwxr-xr-x
📁
debug
-
12/12/2023 07:49:20 AM
rwxr-xr-x
📁
dracut
-
12/27/2025 09:18:16 AM
rwxr-xr-x
📄
echain.so
49.74 KB
03/23/2026 04:30:28 PM
rwxrwxrwx
📁
environment.d
-
12/27/2025 09:18:12 AM
rwxr-xr-x
📁
exim
-
12/12/2023 08:27:57 AM
rwxr-xr-x
📁
firewalld
-
11/04/2025 11:48:24 AM
rwxr-xr-x
📁
firmware
-
12/27/2025 09:21:18 AM
rwxr-xr-x
📁
fontconfig
-
12/12/2023 08:25:28 AM
rwxr-xr-x
📁
games
-
03/25/2022 09:42:08 AM
r-xr-xr-x
📁
gcc
-
02/12/2025 01:07:08 PM
rwxr-xr-x
📁
gems
-
08/31/2025 03:52:35 PM
rwxr-xr-x
📁
grub
-
11/03/2025 07:58:35 AM
rwxr-xr-x
📁
kbd
-
03/13/2025 09:09:50 AM
rwxr-xr-x
📁
kdump
-
08/27/2025 09:40:32 AM
rwxr-xr-x
📁
kernel
-
12/27/2025 09:18:15 AM
rwxr-xr-x
📁
locale
-
11/05/2025 09:32:37 AM
rwxr-xr-x
📁
modprobe.d
-
12/27/2025 09:18:15 AM
rwxr-xr-x
📁
modules
-
12/27/2025 09:18:16 AM
rwxr-xr-x
📁
modules-load.d
-
11/04/2025 12:03:24 PM
rwxr-xr-x
📄
motd
0 bytes
04/03/2024 06:29:31 PM
rw-r--r--
📁
motd.d
-
09/03/2025 03:47:05 AM
rwxr-xr-x
📁
node_modules
-
05/20/2024 06:02:19 AM
rwxr-xr-x
📄
os-release
491 bytes
07/31/2025 11:17:33 AM
rw-r--r--
📁
pam.d
-
12/27/2025 09:18:12 AM
rwxr-xr-x
📁
polkit-1
-
08/27/2025 09:39:53 AM
rwxr-xr-x
📁
python3.9
-
09/02/2025 07:04:27 AM
rwxr-xr-x
📁
rpm
-
12/27/2025 09:18:12 AM
rwxr-xr-x
📄
sendmail
1.03 KB
02/03/2026 06:25:31 PM
rwxr-xr-x
📁
sysctl.d
-
12/27/2025 09:18:15 AM
rwxr-xr-x
📁
sysimage
-
03/25/2022 09:42:08 AM
rwxr-xr-x
📁
systemd
-
12/27/2025 09:18:15 AM
rwxr-xr-x
📁
sysusers.d
-
12/27/2025 09:20:08 AM
rwxr-xr-x
📁
tmpfiles.d
-
12/27/2025 09:20:40 AM
rwxr-xr-x
📁
tuned
-
08/31/2025 03:19:20 PM
rwxr-xr-x
📁
udev
-
12/27/2025 09:18:15 AM
rwxr-xr-x
Editing: sendmail
Close
#!/usr/bin/bash ##CageFS proxyexec wrapper - ver 16 if [[ $EUID -eq 0 ]]; then echo 'Cannot be run as root' exit 1 fi USR=`/usr/bin/whoami` TOKEN=`/bin/cat /var/.cagefs/.cagefs.token` # It's user's tmp directory and write to it is secure procedure # because this script is running only under usual user PIDFILE="/tmp/.cagefs.proxy.$$" USER_INTERRUPT=13 CWD=`pwd` ctrl_c_handler() { if [[ -f "$PIDFILE" ]]; then pid=`/bin/cat $PIDFILE` /bin/rm -f $PIDFILE > /dev/null 2>&1 /bin/kill -s SIGINT "$pid" > /dev/null 2>&1 fi exit $USER_INTERRUPT } if [[ -e /var/.cagefs/origin ]]; then ORIGIN=`/bin/cat /var/.cagefs/origin` REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN" $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" SENDMAIL $$ "$@" RETVAL=$? else trap 'ctrl_c_handler' 2 CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" SENDMAIL $$ "$@" RETVAL=$? /bin/rm -f $PIDFILE > /dev/null 2>&1 fi exit $RETVAL