shell bypass 403
UnknownSec Shell
:
/
usr
/
share
/
doc
/
bpfcc-tools
/
examples
/
tracing
/ [
drwxr-xr-x
]
upload
mass deface
mass delete
console
info server
name :
trace_fields.py
#!/usr/bin/python # Copyright (c) PLUMgrid, Inc. # Licensed under the Apache License, Version 2.0 (the "License") # This is an example of tracing an event and printing custom fields. # run in project examples directory with: # sudo ./trace_fields.py" from __future__ import print_function from bcc import BPF prog = """ int hello(void *ctx) { bpf_trace_printk("Hello, World!\\n"); return 0; } """ b = BPF(text=prog) b.attach_kprobe(event=b.get_syscall_fnname("clone"), fn_name="hello") print("PID MESSAGE") try: b.trace_print(fmt="{1} {5}") except KeyboardInterrupt: exit()
© 2026 UnknownSec