[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.129.70.153: ~ $
���}�(�malware on-demand queue put�}�(�type��dict��help��,Queue on-demand scans for the selected paths��return_type��NullAgentResponse��cli�}��users�]��root�as�schema�}�(�paths�}�(�type��list��schema�}��type��string�s�required���
positional���help��Paths to add to the queue�u�
prioritize�}�(�type��boolean��default���help��!Put the scans on top of the queue�u�
detect_elf�}�(�type��boolean��default���help��2Treat ELF binaries in home directories as malware.�u�	file_mask�}�(�type��string��nullable���help��JSeveral patterns can be added with ", " delimiter.
Example: `*.js, *.php`
�u�ignore_mask�}�(�type��string��nullable���help��KSeveral patterns can be added with ", " delimiter.
Example: `*.log, *.tmp`
�u�	intensity�}�(�type��string��nullable���allowed�]�(�low��moderate��high�e�help��[Scan intensity, simplified.
Overrides `intensity_cpu`, `intensity_io` and `intensity_ram`.
�u�
intensity_cpu�}�(�type��integer��coerce��int��nullable���min�K�max�K�help���CPU usage allowed for the scan - from minimal, to 1 cpu core.
The method depends on the system: lve, cgroups, nice.
The default value can be configured in `MALWARE_SCAN_INTENSITY.cpu` config option.
�u�intensity_io�}�(�type��integer��coerce��int��nullable���min�K�max�K�help��sDisk usage allowed for the scan.
The default value can be configured in `MALWARE_SCAN_INTENSITY.io` config option.
�u�
intensity_ram�}�(�type��integer��coerce��int��nullable���min�M�help��zRAM usage allowed for the scan, in MB.
The default value can be configured in `MALWARE_SCAN_INTENSITY.ram` config option.
�u�follow_symlinks�}�(�type��boolean��default���help��CIf true, the scanner may traverse outside of the initial directory.�u�	scan_file�}�(�type��boolean��default���help��Scan files in set path.�u�scan_db�}�(�type��boolean��default�N�coerce��scan_db��help��1Scan databases of applications found in set path.�uuu�malware on-demand queue remove�}�(�return_type��NullAgentResponse��help��%Remove on-demand scans from the queue��cli�}��users�]��root�as�schema�}��scan_ids�}�(�type��list��schema�}��type��string�s�required���
positional���help��)IDs obtained via `malware on-demand list`�usuu.

Filemanager

Name Type Size Permission Actions
history.pickle File 1.05 KB 0644
history.yaml File 1.17 KB 0644
ignore.pickle File 2.41 KB 0644
ignore.yaml File 2.74 KB 0644
malicious.pickle File 4.74 KB 0644
malicious.yaml File 5.92 KB 0644
malware-rebuild-patterns.pickle File 270 B 0644
malware-rebuild-patterns.yaml File 261 B 0644
malware-rescan-files.pickle File 183 B 0644
malware-rescan-files.yaml File 181 B 0644
malware-send-files.pickle File 236 B 0644
malware-send-files.yaml File 244 B 0644
on-demand-queue.pickle File 2.2 KB 0644
on-demand-queue.yaml File 2.57 KB 0644
on-demand-user.pickle File 1.49 KB 0644
on-demand-user.yaml File 1.59 KB 0644
on-demand.pickle File 3.14 KB 0644
on-demand.yaml File 3.56 KB 0644
read.pickle File 482 B 0644
read.yaml File 526 B 0644
submit.pickle File 802 B 0644
submit.yaml File 915 B 0644
suspicious.pickle File 694 B 0644
suspicious.yaml File 828 B 0644
user.pickle File 1.7 KB 0644
user.yaml File 1.93 KB 0644