Linux ip-172-26-7-228 5.4.0-1103-aws #111~18.04.1-Ubuntu SMP Tue May 23 20:04:10 UTC 2023 x86_64
Apache
: 172.26.7.228 | : 52.14.223.136
Cant Read [ /etc/named.conf ]
5.6.40-24+ubuntu18.04.1+deb.sury.org+1
www-data
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
snap /
core22 /
1722 /
etc /
apparmor.d /
abstractions /
[ HOME SHELL ]
Name
Size
Permission
Action
apparmor_api
[ DIR ]
drwxr-xr-x
ubuntu-browsers.d
[ DIR ]
drwxr-xr-x
X
1.94
KB
-rw-r--r--
apache2-common
978
B
-rw-r--r--
aspell
412
B
-rw-r--r--
audio
1.94
KB
-rw-r--r--
authentication
1.81
KB
-rw-r--r--
base
6.77
KB
-rw-r--r--
bash
1.58
KB
-rw-r--r--
consoles
903
B
-rw-r--r--
crypto
809
B
-rw-r--r--
cups-client
820
B
-rw-r--r--
dbus
694
B
-rw-r--r--
dbus-accessibility
745
B
-rw-r--r--
dbus-accessibility-strict
760
B
-rw-r--r--
dbus-network-manager-strict
1.37
KB
-rw-r--r--
dbus-session
747
B
-rw-r--r--
dbus-session-strict
1010
B
-rw-r--r--
dbus-strict
781
B
-rw-r--r--
dconf
344
B
-rw-r--r--
dovecot-common
675
B
-rw-r--r--
dri-common
542
B
-rw-r--r--
dri-enumerate
392
B
-rw-r--r--
enchant
2.17
KB
-rw-r--r--
exo-open
1.88
KB
-rw-r--r--
fcitx
558
B
-rw-r--r--
fcitx-strict
821
B
-rw-r--r--
fonts
2.22
KB
-rw-r--r--
freedesktop.org
1.37
KB
-rw-r--r--
gio-open
1.51
KB
-rw-r--r--
gnome
3.73
KB
-rw-r--r--
gnupg
459
B
-rw-r--r--
gtk
1.42
KB
-rw-r--r--
gvfs-open
1.15
KB
-rw-r--r--
hosts_access
511
B
-rw-r--r--
ibus
992
B
-rw-r--r--
kde
2.8
KB
-rw-r--r--
kde-globals-write
413
B
-rw-r--r--
kde-icon-cache-write
256
B
-rw-r--r--
kde-language-write
575
B
-rw-r--r--
kde-open5
3.61
KB
-rw-r--r--
kerberosclient
1.25
KB
-rw-r--r--
ldapclient
856
B
-rw-r--r--
libpam-systemd
770
B
-rw-r--r--
likewise
595
B
-rw-r--r--
mdns
554
B
-rw-r--r--
mesa
1.16
KB
-rw-r--r--
mir
694
B
-rw-r--r--
mozc
573
B
-rw-r--r--
mysql
739
B
-rw-r--r--
nameservice
4.29
KB
-rw-r--r--
nis
625
B
-rw-r--r--
nss-systemd
1.22
KB
-rw-r--r--
nvidia
751
B
-rw-r--r--
opencl
370
B
-rw-r--r--
opencl-common
516
B
-rw-r--r--
opencl-intel
672
B
-rw-r--r--
opencl-mesa
636
B
-rw-r--r--
opencl-nvidia
895
B
-rw-r--r--
opencl-pocl
2.84
KB
-rw-r--r--
openssl
648
B
-rw-r--r--
orbit2
197
B
-rw-r--r--
p11-kit
999
B
-rw-r--r--
perl
974
B
-rw-r--r--
php
1.13
KB
-rw-r--r--
php-worker
558
B
-rw-r--r--
php5
208
B
-rw-r--r--
postfix-common
1.32
KB
-rw-r--r--
private-files
1.62
KB
-rw-r--r--
private-files-strict
1.18
KB
-rw-r--r--
python
1.82
KB
-rw-r--r--
qt5
863
B
-rw-r--r--
qt5-compose-cache-write
399
B
-rw-r--r--
qt5-settings-write
514
B
-rw-r--r--
recent-documents-write
466
B
-rw-r--r--
ruby
1008
B
-rw-r--r--
samba
1.13
KB
-rw-r--r--
smbpass
581
B
-rw-r--r--
snap_browsers
1.63
KB
-rw-r--r--
ssl_certs
1.52
KB
-rw-r--r--
ssl_keys
938
B
-rw-r--r--
svn-repositories
1.72
KB
-rw-r--r--
ubuntu-bittorrent-clients
821
B
-rw-r--r--
ubuntu-browsers
1.58
KB
-rw-r--r--
ubuntu-console-browsers
731
B
-rw-r--r--
ubuntu-console-email
718
B
-rw-r--r--
ubuntu-email
1.06
KB
-rw-r--r--
ubuntu-feed-readers
456
B
-rw-r--r--
ubuntu-gnome-terminal
300
B
-rw-r--r--
ubuntu-helpers
3.7
KB
-rw-r--r--
ubuntu-konsole
453
B
-rw-r--r--
ubuntu-media-players
2.3
KB
-rw-r--r--
ubuntu-unity7-base
2.5
KB
-rw-r--r--
ubuntu-unity7-launcher
311
B
-rw-r--r--
ubuntu-unity7-messaging
313
B
-rw-r--r--
ubuntu-xterm
346
B
-rw-r--r--
user-download
987
B
-rw-r--r--
user-mail
944
B
-rw-r--r--
user-manpages
1000
B
-rw-r--r--
user-tmp
760
B
-rw-r--r--
user-write
972
B
-rw-r--r--
video
231
B
-rw-r--r--
vulkan
1.06
KB
-rw-r--r--
wayland
645
B
-rw-r--r--
web-data
811
B
-rw-r--r--
winbind
882
B
-rw-r--r--
wutmp
711
B
-rw-r--r--
xad
984
B
-rw-r--r--
xdg-desktop
782
B
-rw-r--r--
xdg-open
2.23
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : private-files
# vim:syntax=apparmor # privacy-violations contains rules for common files that you want to # explicitly deny access abi <abi/3.0>, # privacy violations (don't audit files under $HOME otherwise get a # lot of false positives when reading contents of directories) deny @{HOME}/.*history mrwkl, deny @{HOME}/.fetchmail* mrwkl, deny @{HOME}/.mutt** mrwkl, deny @{HOME}/.viminfo* mrwkl, deny @{HOME}/.*~ mrwkl, deny @{HOME}/.*.swp mrwkl, deny @{HOME}/.*~1~ mrwkl, deny @{HOME}/.*.bak mrwkl, # special attention to (potentially) executable files audit deny @{HOME}/bin/{,**} wl, audit deny @{HOME}/.config/ w, audit deny @{HOME}/.config/autostart/{,**} wl, audit deny @{HOME}/.config/upstart/{,**} wl, audit deny @{HOME}/.init/{,**} wl, audit deny @{HOME}/.kde{,4}/ w, audit deny @{HOME}/.kde{,4}/Autostart/{,**} wl, audit deny @{HOME}/.kde{,4}/env/{,**} wl, audit deny @{HOME}/.local/{,share/} w, audit deny @{HOME}/.local/share/thumbnailers/{,**} wl, audit deny @{HOME}/.pki/ w, audit deny @{HOME}/.pki/nssdb/{,*.so{,.[0-9]*}} wl, # don't allow reading/updating of run control files deny @{HOME}/.*rc mrk, audit deny @{HOME}/.*rc wl, # bash deny @{HOME}/.bash* mrk, audit deny @{HOME}/.bash* wl, deny @{HOME}/.inputrc mrk, audit deny @{HOME}/.inputrc wl, # sh/dash/csh/tcsh/pdksh/zsh deny @{HOME}/.{,z}profile* mrk, audit deny @{HOME}/.{,z}profile* wl, deny @{HOME}/.{,z}log{in,out} mrk, audit deny @{HOME}/.{,z}log{in,out} wl, deny @{HOME}/.zshenv mrk, audit deny @{HOME}/.zshenv wl, # Include additions to the abstraction include if exists <abstractions/private-files.d>
Close