[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@18.220.85.96: ~ $
# This cronjob is responsible for receiving the updates of WP Toolkit.
# It works as following logic:
# - WPT CLI is called to receive the available update version;
# - If update is found, then the URLs to the host with repositories are updated and cache is cleared for WPT repos;
# - If WPT CLI fails (e.g. unable to communicate with update service or WPT is completely broken), then
# the cronjob executes wp-toolkit-installer script to set the default URLs to host with repositories;
# - Finally the yum update is called to install latest available version.

0 1 * * * root sleep $((1 + RANDOM \% 5))h $((1 + RANDOM \% 60))m; /usr/local/bin/wp-toolkit update-configuration > /dev/null 2> /dev/null || /usr/local/cpanel/3rdparty/wp-toolkit/bin/wp-toolkit-installer.sh --generate-configs > /dev/null 2> /dev/null; /usr/bin/yum -y update wp-toolkit-cpanel > /dev/null 2> /dev/null

Filemanager

Name Type Size Permission Actions
0hourly File 128 B 0644
cpanel-analytics File 130 B 0600
cpanel_autossl File 58 B 0600
csf-cron File 14 B 0644
csf_update File 47 B 0600
imunify-antivirus File 518 B 0644
imunify-notifier File 144 B 0644
imunify_scan_schedule File 129 B 0600
kcare-cron File 54 B 0644
lfd-cron File 74 B 0644
libcare-cron File 0 B 0644
mailman File 2.2 KB 0644
softaculous File 316 B 0644
softaculous2 File 157 B 0644
sysstat File 235 B 0600
wp-toolkit-update File 881 B 0644