Linux vps-4302913.novaexata.com.br 3.10.0-1160.119.1.el7.tuxcare.els19.x86_64 #1 SMP Mon Mar 31 17:29:00 UTC 2025 x86_64
Apache
: 162.214.88.42 | : 216.73.216.156
166 Domain
7.3.33
wwnova
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
systemtap /
tapset /
dyninst /
[ HOME SHELL ]
Name
Size
Permission
Action
context-envvar.stp
645
B
-rw-r--r--
context.stp
3.1
KB
-rw-r--r--
ctime.stp
909
B
-rw-r--r--
endian.stp
717
B
-rw-r--r--
guru-delay.stp
561
B
-rw-r--r--
inet.stp
796
B
-rw-r--r--
syscalls.stpm
213
B
-rw-r--r--
target_set.stp
643
B
-rw-r--r--
timestamp_gtod.stp
852
B
-rw-r--r--
tzinfo.stp
573
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : target_set.stp
// NB: functionally equivalent to linux/target_set.stp @__private30 global _target_set # map: target-set-pid -> ancestor-pid function target_set_pid (pid) { return ([pid] in _target_set) } probe init { if (target()) _target_set[target()] = stp_pid() } probe process.begin { // NB: by definition, every process we see in stapdyn is part of the // target set, so we don't need to filter like linux/target_set.stp. _target_set[pid()] = ppid() } probe process.end { delete _target_set[pid()] } function target_set_report () { printf("target set:\n") foreach (pid in _target_set+) printf("%d begat %d\n", _target_set[pid], pid) }
Close