Linux webserver 6.8.0-49-generic #49~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Wed Nov 6 17:42:15 UTC 2 x86_64
Apache/2.4.52 (Ubuntu)
Server IP : 192.168.1.1 & Your IP : 18.117.129.247
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
snap /
certbot /
4482 /
usr /
include /
linux /
netfilter /
Delete
Unzip
Name
Size
Permission
Date
Action
ipset
[ DIR ]
drwxr-xr-x
2025-03-11 15:15
nf_conntrack_common.h
4.48
KB
-rw-r--r--
2025-02-12 19:54
nf_conntrack_ftp.h
438
B
-rw-r--r--
2025-02-12 19:54
nf_conntrack_sctp.h
597
B
-rw-r--r--
2025-02-12 19:54
nf_conntrack_tcp.h
1.38
KB
-rw-r--r--
2025-02-12 19:54
nf_conntrack_tuple_common.h
896
B
-rw-r--r--
2025-02-12 19:54
nf_log.h
538
B
-rw-r--r--
2025-02-12 19:54
nf_nat.h
1.55
KB
-rw-r--r--
2025-02-12 19:54
nf_synproxy.h
576
B
-rw-r--r--
2025-02-12 19:54
nf_tables.h
56.88
KB
-rw-r--r--
2025-02-12 19:54
nf_tables_compat.h
731
B
-rw-r--r--
2025-02-12 19:54
nfnetlink.h
2.4
KB
-rw-r--r--
2025-02-12 19:54
nfnetlink_acct.h
900
B
-rw-r--r--
2025-02-12 19:54
nfnetlink_compat.h
2.39
KB
-rw-r--r--
2025-02-12 19:54
nfnetlink_conntrack.h
6.04
KB
-rw-r--r--
2025-02-12 19:54
nfnetlink_cthelper.h
1.18
KB
-rw-r--r--
2025-02-12 19:54
nfnetlink_cttimeout.h
2.88
KB
-rw-r--r--
2025-02-12 19:54
nfnetlink_hook.h
2.12
KB
-rw-r--r--
2025-02-12 19:54
nfnetlink_log.h
3.03
KB
-rw-r--r--
2025-02-12 19:54
nfnetlink_osf.h
2.6
KB
-rw-r--r--
2025-02-12 19:54
nfnetlink_queue.h
3.5
KB
-rw-r--r--
2025-02-12 19:54
x_tables.h
4.36
KB
-rw-r--r--
2025-02-12 19:54
xt_AUDIT.h
528
B
-rw-r--r--
2025-02-12 19:54
xt_CHECKSUM.h
563
B
-rw-r--r--
2025-02-12 19:54
xt_CLASSIFY.h
217
B
-rw-r--r--
2025-02-12 19:54
xt_CONNMARK.h
199
B
-rw-r--r--
2025-02-12 19:54
xt_CONNSECMARK.h
301
B
-rw-r--r--
2025-02-12 19:54
xt_CT.h
853
B
-rw-r--r--
2025-02-12 19:54
xt_DSCP.h
697
B
-rw-r--r--
2025-02-12 19:54
xt_HMARK.h
933
B
-rw-r--r--
2025-02-12 19:54
xt_IDLETIMER.h
1001
B
-rw-r--r--
2025-02-12 19:54
xt_LED.h
470
B
-rw-r--r--
2025-02-12 19:54
xt_LOG.h
642
B
-rw-r--r--
2025-02-12 19:54
xt_MARK.h
184
B
-rw-r--r--
2025-02-12 19:54
xt_NFLOG.h
556
B
-rw-r--r--
2025-02-12 19:54
xt_NFQUEUE.h
779
B
-rw-r--r--
2025-02-12 19:54
xt_RATEEST.h
390
B
-rw-r--r--
2025-02-12 19:54
xt_SECMARK.h
648
B
-rw-r--r--
2025-02-12 19:54
xt_SYNPROXY.h
498
B
-rw-r--r--
2025-02-12 19:54
xt_TCPMSS.h
235
B
-rw-r--r--
2025-02-12 19:54
xt_TCPOPTSTRIP.h
407
B
-rw-r--r--
2025-02-12 19:54
xt_TEE.h
333
B
-rw-r--r--
2025-02-12 19:54
xt_TPROXY.h
575
B
-rw-r--r--
2025-02-12 19:54
xt_addrtype.h
1.06
KB
-rw-r--r--
2025-02-12 19:54
xt_bpf.h
935
B
-rw-r--r--
2025-02-12 19:54
xt_cgroup.h
740
B
-rw-r--r--
2025-02-12 19:54
xt_cluster.h
374
B
-rw-r--r--
2025-02-12 19:54
xt_comment.h
230
B
-rw-r--r--
2025-02-12 19:54
xt_connbytes.h
577
B
-rw-r--r--
2025-02-12 19:54
xt_connlabel.h
360
B
-rw-r--r--
2025-02-12 19:54
xt_connlimit.h
575
B
-rw-r--r--
2025-02-12 19:54
xt_connmark.h
646
B
-rw-r--r--
2025-02-12 19:54
xt_conntrack.h
2.5
KB
-rw-r--r--
2025-02-12 19:54
xt_cpu.h
199
B
-rw-r--r--
2025-02-12 19:54
xt_dccp.h
483
B
-rw-r--r--
2025-02-12 19:54
xt_devgroup.h
429
B
-rw-r--r--
2025-02-12 19:54
xt_dscp.h
701
B
-rw-r--r--
2025-02-12 19:54
xt_ecn.h
736
B
-rw-r--r--
2025-02-12 19:54
xt_esp.h
418
B
-rw-r--r--
2025-02-12 19:54
xt_hashlimit.h
3.18
KB
-rw-r--r--
2025-02-12 19:54
xt_helper.h
188
B
-rw-r--r--
2025-02-12 19:54
xt_ipcomp.h
485
B
-rw-r--r--
2025-02-12 19:54
xt_iprange.h
581
B
-rw-r--r--
2025-02-12 19:54
xt_ipvs.h
680
B
-rw-r--r--
2025-02-12 19:54
xt_l2tp.h
739
B
-rw-r--r--
2025-02-12 19:54
xt_length.h
221
B
-rw-r--r--
2025-02-12 19:54
xt_limit.h
673
B
-rw-r--r--
2025-02-12 19:54
xt_mac.h
227
B
-rw-r--r--
2025-02-12 19:54
xt_mark.h
260
B
-rw-r--r--
2025-02-12 19:54
xt_multiport.h
721
B
-rw-r--r--
2025-02-12 19:54
xt_nfacct.h
421
B
-rw-r--r--
2025-02-12 19:54
xt_osf.h
1.03
KB
-rw-r--r--
2025-02-12 19:54
xt_owner.h
535
B
-rw-r--r--
2025-02-12 19:54
xt_physdev.h
553
B
-rw-r--r--
2025-02-12 19:54
xt_pkttype.h
188
B
-rw-r--r--
2025-02-12 19:54
xt_policy.h
1.03
KB
-rw-r--r--
2025-02-12 19:54
xt_quota.h
400
B
-rw-r--r--
2025-02-12 19:54
xt_rateest.h
859
B
-rw-r--r--
2025-02-12 19:54
xt_realm.h
220
B
-rw-r--r--
2025-02-12 19:54
xt_recent.h
1.03
KB
-rw-r--r--
2025-02-12 19:54
xt_rpfilter.h
320
B
-rw-r--r--
2025-02-12 19:54
xt_sctp.h
2.27
KB
-rw-r--r--
2025-02-12 19:54
xt_set.h
1.78
KB
-rw-r--r--
2025-02-12 19:54
xt_socket.h
640
B
-rw-r--r--
2025-02-12 19:54
xt_state.h
331
B
-rw-r--r--
2025-02-12 19:54
xt_statistic.h
716
B
-rw-r--r--
2025-02-12 19:54
xt_string.h
664
B
-rw-r--r--
2025-02-12 19:54
xt_tcpmss.h
253
B
-rw-r--r--
2025-02-12 19:54
xt_tcpudp.h
1.22
KB
-rw-r--r--
2025-02-12 19:54
xt_time.h
730
B
-rw-r--r--
2025-02-12 19:54
xt_u32.h
752
B
-rw-r--r--
2025-02-12 19:54
Save
Rename
/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ #ifndef _X_TABLES_H #define _X_TABLES_H #include <linux/const.h> #include <linux/types.h> #define XT_FUNCTION_MAXNAMELEN 30 #define XT_EXTENSION_MAXNAMELEN 29 #define XT_TABLE_MAXNAMELEN 32 struct xt_entry_match { union { struct { __u16 match_size; /* Used by userspace */ char name[XT_EXTENSION_MAXNAMELEN]; __u8 revision; } user; struct { __u16 match_size; /* Used inside the kernel */ struct xt_match *match; } kernel; /* Total length */ __u16 match_size; } u; unsigned char data[]; }; struct xt_entry_target { union { struct { __u16 target_size; /* Used by userspace */ char name[XT_EXTENSION_MAXNAMELEN]; __u8 revision; } user; struct { __u16 target_size; /* Used inside the kernel */ struct xt_target *target; } kernel; /* Total length */ __u16 target_size; } u; unsigned char data[0]; }; #define XT_TARGET_INIT(__name, __size) \ { \ .target.u.user = { \ .target_size = XT_ALIGN(__size), \ .name = __name, \ }, \ } struct xt_standard_target { struct xt_entry_target target; int verdict; }; struct xt_error_target { struct xt_entry_target target; char errorname[XT_FUNCTION_MAXNAMELEN]; }; /* The argument to IPT_SO_GET_REVISION_*. Returns highest revision * kernel supports, if >= revision. */ struct xt_get_revision { char name[XT_EXTENSION_MAXNAMELEN]; __u8 revision; }; /* CONTINUE verdict for targets */ #define XT_CONTINUE 0xFFFFFFFF /* For standard target */ #define XT_RETURN (-NF_REPEAT - 1) /* this is a dummy structure to find out the alignment requirement for a struct * containing all the fundamental data types that are used in ipt_entry, * ip6t_entry and arpt_entry. This sucks, and it is a hack. It will be my * personal pleasure to remove it -HW */ struct _xt_align { __u8 u8; __u16 u16; __u32 u32; __u64 u64; }; #define XT_ALIGN(s) __ALIGN_KERNEL((s), __alignof__(struct _xt_align)) /* Standard return verdict, or do jump. */ #define XT_STANDARD_TARGET "" /* Error verdict. */ #define XT_ERROR_TARGET "ERROR" #define SET_COUNTER(c,b,p) do { (c).bcnt = (b); (c).pcnt = (p); } while(0) #define ADD_COUNTER(c,b,p) do { (c).bcnt += (b); (c).pcnt += (p); } while(0) struct xt_counters { __u64 pcnt, bcnt; /* Packet and byte counters */ }; /* The argument to IPT_SO_ADD_COUNTERS. */ struct xt_counters_info { /* Which table. */ char name[XT_TABLE_MAXNAMELEN]; unsigned int num_counters; /* The counters (actually `number' of these). */ struct xt_counters counters[]; }; #define XT_INV_PROTO 0x40 /* Invert the sense of PROTO. */ /* fn returns 0 to continue iteration */ #define XT_MATCH_ITERATE(type, e, fn, args...) \ ({ \ unsigned int __i; \ int __ret = 0; \ struct xt_entry_match *__m; \ \ for (__i = sizeof(type); \ __i < (e)->target_offset; \ __i += __m->u.match_size) { \ __m = (void *)e + __i; \ \ __ret = fn(__m , ## args); \ if (__ret != 0) \ break; \ } \ __ret; \ }) /* fn returns 0 to continue iteration */ #define XT_ENTRY_ITERATE_CONTINUE(type, entries, size, n, fn, args...) \ ({ \ unsigned int __i, __n; \ int __ret = 0; \ type *__entry; \ \ for (__i = 0, __n = 0; __i < (size); \ __i += __entry->next_offset, __n++) { \ __entry = (void *)(entries) + __i; \ if (__n < n) \ continue; \ \ __ret = fn(__entry , ## args); \ if (__ret != 0) \ break; \ } \ __ret; \ }) /* fn returns 0 to continue iteration */ #define XT_ENTRY_ITERATE(type, entries, size, fn, args...) \ XT_ENTRY_ITERATE_CONTINUE(type, entries, size, 0, fn, args) /* pos is normally a struct ipt_entry/ip6t_entry/etc. */ #define xt_entry_foreach(pos, ehead, esize) \ for ((pos) = (typeof(pos))(ehead); \ (pos) < (typeof(pos))((char *)(ehead) + (esize)); \ (pos) = (typeof(pos))((char *)(pos) + (pos)->next_offset)) /* can only be xt_entry_match, so no use of typeof here */ #define xt_ematch_foreach(pos, entry) \ for ((pos) = (struct xt_entry_match *)entry->elems; \ (pos) < (struct xt_entry_match *)((char *)(entry) + \ (entry)->target_offset); \ (pos) = (struct xt_entry_match *)((char *)(pos) + \ (pos)->u.match_size)) #endif /* _X_TABLES_H */