[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@18.216.89.144: ~ $
��}�(�submit false-positive�}�(�help��`Submit a legitimate file detected by scanner as malicious/infected to Imunify team for analysis.��cli�}��users�]��root�as�type��dict��schema�}�(�filename�}�(�type��string��empty���coerce��path��
positional���required���help��Path to the file on the server.�u�scanner�}�(�type��string��allowed�]��ai-bolit�a�required���help��
DEPRECATED�u�reason�}�(�type��string��required���help��+Any additional info/comment about the file.�uuu�submit false-negative�}�(�help��QSubmit a malicious file not yet detected by scanner to Imunify team for analysis.��cli�}��users�]��root�as�type��dict��schema�}��filename�}�(�type��string��empty���coerce��path��
positional���required���help��Path to the file on the server.�usuu.

Filemanager

Name Type Size Permission Actions
history.pickle File 1.05 KB 0644
history.yaml File 1.17 KB 0644
ignore.pickle File 2.41 KB 0644
ignore.yaml File 2.74 KB 0644
malicious.pickle File 4.74 KB 0644
malicious.yaml File 5.92 KB 0644
malware-rebuild-patterns.pickle File 270 B 0644
malware-rebuild-patterns.yaml File 261 B 0644
malware-rescan-files.pickle File 183 B 0644
malware-rescan-files.yaml File 181 B 0644
malware-send-files.pickle File 236 B 0644
malware-send-files.yaml File 244 B 0644
on-demand-queue.pickle File 2.2 KB 0644
on-demand-queue.yaml File 2.57 KB 0644
on-demand-user.pickle File 1.49 KB 0644
on-demand-user.yaml File 1.59 KB 0644
on-demand.pickle File 3.14 KB 0644
on-demand.yaml File 3.56 KB 0644
read.pickle File 482 B 0644
read.yaml File 526 B 0644
submit.pickle File 802 B 0644
submit.yaml File 915 B 0644
suspicious.pickle File 694 B 0644
suspicious.yaml File 828 B 0644
user.pickle File 1.7 KB 0644
user.yaml File 1.93 KB 0644