Linux vmi2545633.contaboserver.net 6.1.0-32-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.129-1 (2025-03-06) x86_64
Apache/2.4.62 (Debian)
Server IP : 127.0.0.1 & Your IP : 127.0.0.1
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
etc /
systemd /
system /
Delete
Unzip
Name
Size
Permission
Date
Action
getty.target.wants
[ DIR ]
drwxr-xr-x
2023-07-12 09:37
multi-user.target.wants
[ DIR ]
drwxr-xr-x
2025-10-09 09:52
network-online.target.wants
[ DIR ]
drwxr-xr-x
2023-07-12 09:37
sysinit.target.wants
[ DIR ]
drwxr-xr-x
2023-07-12 09:40
timers.target.wants
[ DIR ]
drwxr-xr-x
2025-04-08 11:08
ai-endpoint.service
356
B
-rw-r--r--
2025-04-08 17:06
dbus-org.freedesktop.timesync1.service
1.72
KB
-rw-r--r--
2025-03-06 14:56
pm2-mesut.service
621
B
-rw-r--r--
2025-04-08 13:09
pm2-root.service
603
B
-rw-r--r--
2025-04-08 13:07
redis.service
1.79
KB
-rw-r--r--
2025-01-19 10:41
sshd.service
538
B
-rw-r--r--
2025-02-14 13:06
Save
Rename
[Unit] Description=Advanced key-value store After=network.target Documentation=http://redis.io/documentation, man:redis-server(1) [Service] Type=notify ExecStart=/usr/bin/redis-server /etc/redis/redis.conf --supervised systemd --daemonize no PIDFile=/run/redis/redis-server.pid TimeoutStopSec=0 Restart=always User=redis Group=redis RuntimeDirectory=redis RuntimeDirectoryMode=2755 UMask=007 PrivateTmp=true LimitNOFILE=65535 PrivateDevices=true ProtectHome=true ProtectSystem=strict ReadWritePaths=-/var/lib/redis ReadWritePaths=-/var/log/redis ReadWritePaths=-/var/run/redis CapabilityBoundingSet= LockPersonality=true MemoryDenyWriteExecute=true NoNewPrivileges=true PrivateUsers=true ProtectClock=true ProtectControlGroups=true ProtectHostname=true ProtectKernelLogs=true ProtectKernelModules=true ProtectKernelTunables=true ProtectProc=invisible RemoveIPC=true RestrictAddressFamilies=AF_INET AF_INET6 AF_UNIX RestrictNamespaces=true RestrictRealtime=true RestrictSUIDSGID=true SystemCallArchitectures=native SystemCallFilter=@system-service SystemCallFilter=~ @privileged @resources # redis-server can write to its own config file when in cluster mode so we # permit writing there by default. If you are not using this feature, it is # recommended that you remove this line. ReadWriteDirectories=-/etc/redis # This restricts this service from executing binaries other than redis-server # itself. This is really effective at e.g. making it impossible to an # attacker to spawn a shell on the system, but might be more restrictive # than desired. If you need to, you can permit the execution of extra # binaries by adding an extra ExecPaths= directive with the command # systemctl edit redis-server.service NoExecPaths=/ ExecPaths=/usr/bin/redis-server /usr/lib /lib [Install] WantedBy=multi-user.target Alias=redis.service