[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@18.225.56.243: ~ $
���}�(�malware on-demand list�}�(�return_type��OnDemandScanListAgentResponse��help�� Show the list of on-demand scans��type��dict��cli�}��users�]��root�as�schema�}�(�since�}�(�type��integer��coerce��int��default�K�help��-Show scans started after this unix timestamp.�u�to�}�(�type��integer��coerce��int��default_setter��now��help��.Show scans started before this unix timestamp.�u�limit�}�(�type��integer��coerce��int��default�K2�help��	Page size�u�offset�}�(�type��integer��coerce��int��default�K�help��Page offset�u�order_by�}�(�type��list��schema�}�(�type��order_by��coerce��order_by�u�nullable���help���List of fields to order by, each followed by a `+` (ascending) or `-` (descending).
E.g. `["total_malicious-","started-"]` would order by `total_malicious` and `started` descending.
�uuu�malware on-demand start�}�(�return_type��NullAgentResponse��help��QDEPRECATED - use `malware on-demand queue put` instead.
Start an on-demand scan.
��type��dict��cli�}��users�]��root�as�schema�}�(�path�}�(�type��string��required���help��Path to scan�u�	file_mask�}�(�type��string��nullable���dependencies�}��	scan_file��s�help��JSeveral patterns can be added with ", " delimiter.
Example: `*.js, *.php`
�u�ignore_mask�}�(�type��string��nullable���dependencies�}��	scan_file��s�help��KSeveral patterns can be added with ", " delimiter.
Example: `*.log, *.tmp`
�u�	intensity�}�(�type��string��nullable���allowed�]�(�low��moderate��high�e�help��[Scan intensity, simplified.
Overrides `intensity_cpu`, `intensity_io` and `intensity_ram`.
�u�
intensity_cpu�}�(�type��integer��coerce��int��nullable���min�K�max�K�help���CPU usage allowed for the scan - from minimal, to 1 cpu core.
The method depends on the system: lve, cgroups, nice.
The default value can be configured in `MALWARE_SCAN_INTENSITY.cpu` config option.
�u�intensity_io�}�(�type��integer��coerce��int��nullable���min�K�max�K�help��sDisk usage allowed for the scan.
The default value can be configured in `MALWARE_SCAN_INTENSITY.io` config option.
�u�
intensity_ram�}�(�type��integer��coerce��int��nullable���min�M�help��zRAM usage allowed for the scan, in MB.
The default value can be configured in `MALWARE_SCAN_INTENSITY.ram` config option.
�u�follow_symlinks�}�(�type��boolean��dependencies�}��	scan_file��s�help��CIf true, the scanner may traverse outside of the initial directory.�u�	scan_file�}�(�type��boolean��default���help��Scan files in set path.�u�scan_db�}�(�type��boolean��default�N�coerce��scan_db��help��1Scan databases of applications found in set path.�uuu�malware on-demand stop�}�(�return_type��NullAgentResponse��help��Stop the last on-demand scan��cli�}��users�]��root�as�schema�}��all�}�(�type��boolean��default���help��Stop all the scans�usu�malware on-demand status�}�(�return_type��OnDemandScanStatusAgentResponse��help��-Show the status of the running on-demand scan��cli�}��users�]��root�asu� malware on-demand check-detached�}�(�return_type��NullAgentResponse��help��+(internal) Check for failed on-demand scans��cli�}�(�users�]��root�a�require_rpc��stopped�uuu.

Filemanager

Name Type Size Permission Actions
history.pickle File 1.05 KB 0644
history.yaml File 1.17 KB 0644
ignore.pickle File 2.41 KB 0644
ignore.yaml File 2.74 KB 0644
malicious.pickle File 4.74 KB 0644
malicious.yaml File 5.92 KB 0644
malware-rebuild-patterns.pickle File 270 B 0644
malware-rebuild-patterns.yaml File 261 B 0644
malware-rescan-files.pickle File 183 B 0644
malware-rescan-files.yaml File 181 B 0644
malware-send-files.pickle File 236 B 0644
malware-send-files.yaml File 244 B 0644
on-demand-queue.pickle File 2.2 KB 0644
on-demand-queue.yaml File 2.57 KB 0644
on-demand-user.pickle File 1.49 KB 0644
on-demand-user.yaml File 1.59 KB 0644
on-demand.pickle File 3.14 KB 0644
on-demand.yaml File 3.56 KB 0644
read.pickle File 482 B 0644
read.yaml File 526 B 0644
submit.pickle File 802 B 0644
submit.yaml File 915 B 0644
suspicious.pickle File 694 B 0644
suspicious.yaml File 828 B 0644
user.pickle File 1.7 KB 0644
user.yaml File 1.93 KB 0644