Linux vps-4302913.novaexata.com.br 3.10.0-1160.119.1.el7.tuxcare.els19.x86_64 #1 SMP Mon Mar 31 17:29:00 UTC 2025 x86_64
Apache
: 162.214.88.42 | : 216.73.216.156
166 Domain
7.3.33
wwnova
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
systemtap /
examples /
lwtools /
[ HOME SHELL ]
Name
Size
Permission
Action
README
107
B
-rw-r--r--
accept2close-nd.8
1.39
KB
-rw-r--r--
accept2close-nd.meta
640
B
-rw-r--r--
accept2close-nd.stp
1.76
KB
-rwxr-xr-x
accept2close-nd.txt
3.31
KB
-rw-r--r--
biolatency-nd.8
1.63
KB
-rw-r--r--
biolatency-nd.meta
663
B
-rw-r--r--
biolatency-nd.stp
2.02
KB
-rwxr-xr-x
biolatency-nd_example.txt
7.19
KB
-rw-r--r--
bitesize-nd.8
1.13
KB
-rw-r--r--
bitesize-nd.meta
491
B
-rw-r--r--
bitesize-nd.stp
1.51
KB
-rwxr-xr-x
bitesize-nd_example.txt
3.35
KB
-rw-r--r--
execsnoop-nd.8
1.21
KB
-rw-r--r--
execsnoop-nd.meta
610
B
-rw-r--r--
execsnoop-nd.stp
1.25
KB
-rwxr-xr-x
execsnoop-nd_example.txt
2.52
KB
-rw-r--r--
fslatency-nd.8
1.88
KB
-rw-r--r--
fslatency-nd.meta
700
B
-rw-r--r--
fslatency-nd.stp
3.81
KB
-rwxr-xr-x
fslatency-nd_example.txt
13.07
KB
-rw-r--r--
fsslower-nd.8
1.71
KB
-rw-r--r--
fsslower-nd.meta
662
B
-rw-r--r--
fsslower-nd.stp
3.55
KB
-rwxr-xr-x
fsslower-nd_example.txt
1.89
KB
-rw-r--r--
killsnoop-nd.8
1.1
KB
-rw-r--r--
killsnoop-nd.meta
424
B
-rw-r--r--
killsnoop-nd.stp
1.25
KB
-rwxr-xr-x
killsnoop-nd_example.txt
1.86
KB
-rw-r--r--
opensnoop-nd.8
1.24
KB
-rw-r--r--
opensnoop-nd.meta
397
B
-rw-r--r--
opensnoop-nd.stp
1
KB
-rwxr-xr-x
opensnoop-nd_example.txt
1.1
KB
-rw-r--r--
rwtime-nd.8
1.12
KB
-rw-r--r--
rwtime-nd.meta
449
B
-rw-r--r--
rwtime-nd.stp
1.56
KB
-rwxr-xr-x
rwtime-nd_example.txt
4.09
KB
-rw-r--r--
syscallbypid-nd.8
1.06
KB
-rw-r--r--
syscallbypid-nd.meta
447
B
-rw-r--r--
syscallbypid-nd.stp
1.07
KB
-rwxr-xr-x
syscallbypid-nd_example.txt
9.1
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : execsnoop-nd_example.txt
Examples of execsnoop-nd.stp, the Linux SystemTap version. Tracing while "man ls" was executed: # ./execsnoop-nd.stp TIME UID PPID PID COMM ARGS Sat Jan 31 00:56:02 2015 0 11962 13472 man man ls Sat Jan 31 00:56:02 2015 0 13472 13473 sh sh -c /usr/bin/gunzip -c /usr/share/man/man1/ls.1.gz Sat Jan 31 00:56:02 2015 0 13472 13473 gunzip /bin/sh /usr/bin/gunzip -c /usr/share/man/man1/ls.1.gz Sat Jan 31 00:56:02 2015 0 13472 13473 gzip gzip -d -c /usr/share/man/man1/ls.1.gz Sat Jan 31 00:56:02 2015 0 13472 13474 sh sh -c /usr/bin/gunzip -c /usr/share/man/man1/ls.1.gz Sat Jan 31 00:56:02 2015 0 13472 13474 gunzip /bin/sh /usr/bin/gunzip -c /usr/share/man/man1/ls.1.gz Sat Jan 31 00:56:02 2015 0 13472 13474 gzip gzip -d -c /usr/share/man/man1/ls.1.gz Sat Jan 31 00:56:02 2015 0 13472 13475 sh sh -c (cd "/usr/share/man" && (echo ".ll 15.5i"; echo ".nr LL 15.5i"; echo ".pl 1100i"; /usr/bin/gunzip -c '/usr/share/man/man1/ls.1.gz'; echo ".\\\""; echo ".pl \n(nlu+10") | /usr/bin/gtbl | /usr/bin/nroff -c -mandoc 2>/dev/null | /usr/bin/less -is) Sat Jan 31 00:56:02 2015 0 13476 13479 nroff /bin/bash /usr/bin/nroff -c -mandoc Sat Jan 31 00:56:02 2015 0 13476 13481 less /usr/bin/less -is Sat Jan 31 00:56:02 2015 0 13476 13478 gtbl /usr/bin/gtbl Sat Jan 31 00:56:02 2015 0 13477 13480 gunzip /bin/sh /usr/bin/gunzip -c /usr/share/man/man1/ls.1.gz Sat Jan 31 00:56:02 2015 0 13477 13480 gzip gzip -d -c /usr/share/man/man1/ls.1.gz Sat Jan 31 00:56:02 2015 0 13482 13483 locale locale charmap Sat Jan 31 00:56:02 2015 0 13484 13485 mktemp mktemp /tmp/man.XXXXXX Sat Jan 31 00:56:02 2015 0 13479 13486 cat cat Sat Jan 31 00:56:02 2015 0 13479 13487 iconv iconv -f utf-8 -t utf-8 /tmp/man.OGU85G Sat Jan 31 00:56:02 2015 0 13479 13488 rm rm -f /tmp/man.OGU85G Sat Jan 31 00:56:02 2015 0 13476 13479 groff /usr/bin/groff -mtty-char -P-c -mandoc -Tutf8 Sat Jan 31 00:56:02 2015 0 13479 13489 troff troff -mtty-char -mandoc -Tutf8 Sat Jan 31 00:56:02 2015 0 13479 13490 grotty grotty -c The output shows all the exec() syscall, which is a rough way to examine new process execution. Some of these processes have called exec() more than once; also, some new process that only fork() won't be seen.
Close