[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.139.235.59: ~ $
malware on-demand queue put:
  type: dict
  help: Queue on-demand scans for the selected paths
  return_type: NullAgentResponse
  cli:
    users:
      - root
  schema:
    paths:
      type: list
      schema:
        type: string
      required: true
      positional: true
      help: Paths to add to the queue

    prioritize:
      type: boolean
      default: false
      help: Put the scans on top of the queue

    detect_elf:
      type: boolean
      default: false
      help: Treat ELF binaries in home directories as malware.

    file_mask:
      type: string
      nullable: true
      help: |
        Several patterns can be added with ", " delimiter.
        Example: `*.js, *.php`

    ignore_mask:
      type: string
      nullable: true
      help: |
        Several patterns can be added with ", " delimiter.
        Example: `*.log, *.tmp`

    intensity:
      type: string
      nullable: true
      allowed:
        - low
        - moderate
        - high
      help: |
        Scan intensity, simplified.
        Overrides `intensity_cpu`, `intensity_io` and `intensity_ram`.

    intensity_cpu:
      type: integer
      coerce: int
      nullable: true
      min: 1
      max: 7
      help: |
        CPU usage allowed for the scan - from minimal, to 1 cpu core.
        The method depends on the system: lve, cgroups, nice.
        The default value can be configured in `MALWARE_SCAN_INTENSITY.cpu` config option.

    intensity_io:
      type: integer
      coerce: int
      nullable: true
      min: 1
      max: 7
      help: |
        Disk usage allowed for the scan.
        The default value can be configured in `MALWARE_SCAN_INTENSITY.io` config option.

    intensity_ram:
      type: integer
      coerce: int
      nullable: true
      min: 1024
      help: |
        RAM usage allowed for the scan, in MB.
        The default value can be configured in `MALWARE_SCAN_INTENSITY.ram` config option.

    follow_symlinks:
      type: boolean
      default: false
      help: If true, the scanner may traverse outside of the initial directory.

    scan_file:
      type: boolean
      default: true
      help: Scan files in set path.

    scan_db:
      type: boolean
      default: null
      coerce: scan_db
      help: Scan databases of applications found in set path.

malware on-demand queue remove:
  return_type: NullAgentResponse
  help: Remove on-demand scans from the queue
  cli:
    users:
      - root
  schema:
    scan_ids:
      type: list
      schema:
        type: string
      required: false
      positional: true
      help: IDs obtained via `malware on-demand list`

Filemanager

Name Type Size Permission Actions
history.pickle File 1.05 KB 0644
history.yaml File 1.17 KB 0644
ignore.pickle File 2.41 KB 0644
ignore.yaml File 2.74 KB 0644
malicious.pickle File 4.74 KB 0644
malicious.yaml File 5.92 KB 0644
malware-rebuild-patterns.pickle File 270 B 0644
malware-rebuild-patterns.yaml File 261 B 0644
malware-rescan-files.pickle File 183 B 0644
malware-rescan-files.yaml File 181 B 0644
malware-send-files.pickle File 236 B 0644
malware-send-files.yaml File 244 B 0644
on-demand-queue.pickle File 2.2 KB 0644
on-demand-queue.yaml File 2.57 KB 0644
on-demand-user.pickle File 1.49 KB 0644
on-demand-user.yaml File 1.59 KB 0644
on-demand.pickle File 3.14 KB 0644
on-demand.yaml File 3.56 KB 0644
read.pickle File 482 B 0644
read.yaml File 526 B 0644
submit.pickle File 802 B 0644
submit.yaml File 915 B 0644
suspicious.pickle File 694 B 0644
suspicious.yaml File 828 B 0644
user.pickle File 1.7 KB 0644
user.yaml File 1.93 KB 0644