[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.135.198.82: ~ $
malware user list:
  return_type: MalwareUserListAgentResponse
  help: Show the list of users in the system and their infection status
  type: dict
  cli:
    users:
    - root
  schema:
    search:
      type: string
      nullable: true
      help: Search by user name.
    limit:
      type: integer
      coerce: int
      default: 100
      help: Page size
    offset:
      type: integer
      coerce: int
      default: 0
      help: Page offset
    order_by:
      type: list
      schema:
        type: order_by
        coerce: order_by
      nullable: true
      help: |
        List of fields to order by, each followed by a `+` (ascending) or `-` (descending).
        E.g. `["scan_status+","scan_date-"]` would order by `scan_status` ascending and `scan_date` descending.
    user:  # TODO: remove this field
      type: string
      nullable: true
    ids:
      type: list
      schema:
        type: string
      nullable: true
      help: |
        List exact usernames to return. Incompatible with `search` and ignores `order_by`.

malware user scan:
  return_type: NullAgentResponse
  help: Queue on-demand scans for each user on the server
  type: dict
  cli:
    users:
    - root
  schema:
    background:
      type: boolean
      default: false
      help: |
        (internal) Treat it as a "background" scan - lower priority, different cancellation rules, etc.

    follow_symlinks:
      type: boolean
      default: false
      dependencies:
        scan_file: true
      help: If true, the scanner may traverse outside of the users' home directories.

    detect_elf:
      type: boolean
      default: false
      dependencies:
        scan_file: true
      help: Treat ELF binaries in home directories as malware.

    scan_file:
      type: boolean
      default: true
      help: Whether or not to scan users' files.

    scan_db:
      type: boolean
      default: null
      coerce: scan_db
      help: Whether or not to scan users' databases.

Filemanager

Name Type Size Permission Actions
history.pickle File 1.05 KB 0644
history.yaml File 1.17 KB 0644
ignore.pickle File 2.41 KB 0644
ignore.yaml File 2.74 KB 0644
malicious.pickle File 4.74 KB 0644
malicious.yaml File 5.92 KB 0644
malware-rebuild-patterns.pickle File 270 B 0644
malware-rebuild-patterns.yaml File 261 B 0644
malware-rescan-files.pickle File 183 B 0644
malware-rescan-files.yaml File 181 B 0644
malware-send-files.pickle File 236 B 0644
malware-send-files.yaml File 244 B 0644
on-demand-queue.pickle File 2.2 KB 0644
on-demand-queue.yaml File 2.57 KB 0644
on-demand-user.pickle File 1.49 KB 0644
on-demand-user.yaml File 1.59 KB 0644
on-demand.pickle File 3.14 KB 0644
on-demand.yaml File 3.56 KB 0644
read.pickle File 482 B 0644
read.yaml File 526 B 0644
submit.pickle File 802 B 0644
submit.yaml File 915 B 0644
suspicious.pickle File 694 B 0644
suspicious.yaml File 828 B 0644
user.pickle File 1.7 KB 0644
user.yaml File 1.93 KB 0644