Linux server2.hpierson.com 3.10.0-1160.105.1.el7.x86_64 #1 SMP Thu Dec 7 15:39:45 UTC 2023 x86_64
Apache
: 162.0.216.123 | : 216.73.216.152
28 Domain
?7.4.33
yvffpqmy
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
systemtap /
tapset /
dyninst /
[ HOME SHELL ]
Name
Size
Permission
Action
context-envvar.stp
645
B
-rw-r--r--
context.stp
3.1
KB
-rw-r--r--
ctime.stp
909
B
-rw-r--r--
endian.stp
717
B
-rw-r--r--
guru-delay.stp
561
B
-rw-r--r--
inet.stp
796
B
-rw-r--r--
syscalls.stpm
213
B
-rw-r--r--
target_set.stp
643
B
-rw-r--r--
timestamp_gtod.stp
852
B
-rw-r--r--
tzinfo.stp
573
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : target_set.stp
// NB: functionally equivalent to linux/target_set.stp @__private30 global _target_set # map: target-set-pid -> ancestor-pid function target_set_pid (pid) { return ([pid] in _target_set) } probe init { if (target()) _target_set[target()] = stp_pid() } probe process.begin { // NB: by definition, every process we see in stapdyn is part of the // target set, so we don't need to filter like linux/target_set.stp. _target_set[pid()] = ppid() } probe process.end { delete _target_set[pid()] } function target_set_report () { printf("target set:\n") foreach (pid in _target_set+) printf("%d begat %d\n", _target_set[pid], pid) }
Close