Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.224.55.193
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib64 /
perl5 /
vendor_perl /
auto /
Net /
SSLeay /
[ HOME SHELL ]
Name
Size
Permission
Action
SSLeay.so
423.98
KB
-rwxr-xr-x
autosplit.ix
1.54
KB
-rw-r--r--
debug_read.al
677
B
-rw-r--r--
do_https.al
507
B
-rw-r--r--
do_https2.al
446
B
-rw-r--r--
do_https3.al
466
B
-rw-r--r--
do_https4.al
357
B
-rw-r--r--
do_httpx2.al
535
B
-rw-r--r--
do_httpx3.al
1.52
KB
-rw-r--r--
do_httpx4.al
544
B
-rw-r--r--
dump_peer_certificate.al
958
B
-rw-r--r--
get_http.al
316
B
-rw-r--r--
get_http3.al
319
B
-rw-r--r--
get_http4.al
319
B
-rw-r--r--
get_https.al
319
B
-rw-r--r--
get_https3.al
322
B
-rw-r--r--
get_https4.al
322
B
-rw-r--r--
get_httpx.al
316
B
-rw-r--r--
get_httpx3.al
319
B
-rw-r--r--
get_httpx4.al
319
B
-rw-r--r--
head_http.al
319
B
-rw-r--r--
head_http3.al
322
B
-rw-r--r--
head_http4.al
346
B
-rw-r--r--
head_https.al
322
B
-rw-r--r--
head_https3.al
325
B
-rw-r--r--
head_https4.al
333
B
-rw-r--r--
head_httpx.al
319
B
-rw-r--r--
head_httpx3.al
322
B
-rw-r--r--
head_httpx4.al
399
B
-rw-r--r--
http_cat.al
1.18
KB
-rw-r--r--
https_cat.al
2.96
KB
-rw-r--r--
httpx_cat.al
558
B
-rw-r--r--
initialize.al
814
B
-rw-r--r--
make_form.al
604
B
-rw-r--r--
make_headers.al
575
B
-rw-r--r--
new_x_ctx.al
1.2
KB
-rw-r--r--
open_proxy_tcp_connection.al
1.25
KB
-rw-r--r--
open_tcp_connection.al
1.4
KB
-rw-r--r--
post_http.al
318
B
-rw-r--r--
post_http3.al
321
B
-rw-r--r--
post_http4.al
321
B
-rw-r--r--
post_https.al
321
B
-rw-r--r--
post_https3.al
324
B
-rw-r--r--
post_https4.al
324
B
-rw-r--r--
post_httpx.al
318
B
-rw-r--r--
post_httpx3.al
321
B
-rw-r--r--
post_httpx4.al
321
B
-rw-r--r--
put_http.al
316
B
-rw-r--r--
put_http3.al
319
B
-rw-r--r--
put_http4.al
319
B
-rw-r--r--
put_https.al
319
B
-rw-r--r--
put_https3.al
322
B
-rw-r--r--
put_https4.al
322
B
-rw-r--r--
put_httpx.al
316
B
-rw-r--r--
put_httpx3.al
319
B
-rw-r--r--
put_httpx4.al
319
B
-rw-r--r--
randomize.al
1.05
KB
-rw-r--r--
set_cert_and_key.al
805
B
-rw-r--r--
set_proxy.al
540
B
-rw-r--r--
set_server_cert_and_key.al
413
B
-rw-r--r--
ssl_read_CRLF.al
384
B
-rw-r--r--
ssl_read_all.al
801
B
-rw-r--r--
ssl_read_until.al
3.04
KB
-rw-r--r--
ssl_write_CRLF.al
812
B
-rw-r--r--
ssl_write_all.al
5.6
KB
-rw-r--r--
sslcat.al
3.05
KB
-rw-r--r--
tcp_read_CRLF.al
400
B
-rw-r--r--
tcp_read_all.al
756
B
-rw-r--r--
tcp_read_until.al
970
B
-rw-r--r--
tcp_write_CRLF.al
793
B
-rw-r--r--
tcp_write_all.al
1.2
KB
-rw-r--r--
tcpcat.al
1.33
KB
-rw-r--r--
tcpxcat.al
485
B
-rw-r--r--
want_X509_lookup.al
441
B
-rw-r--r--
want_nothing.al
357
B
-rw-r--r--
want_read.al
309
B
-rw-r--r--
want_write.al
312
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : open_tcp_connection.al
# NOTE: Derived from blib/lib/Net/SSLeay.pm. # Changes made here will be lost when autosplit is run again. # See AutoSplit.pm. package Net::SSLeay; #line 438 "blib/lib/Net/SSLeay.pm (autosplit into blib/lib/auto/Net/SSLeay/open_tcp_connection.al)" sub open_tcp_connection { my ($dest_serv, $port) = @_; my ($errs); $port = getservbyname($port, 'tcp') unless $port =~ /^\d+$/; my $dest_serv_ip = gethostbyname($dest_serv); unless (defined($dest_serv_ip)) { $errs = "$0 $$: open_tcp_connection: destination host not found:" . " `$dest_serv' (port $port) ($!)\n"; warn $errs if $trace; return wantarray ? (0, $errs) : 0; } my $sin = sockaddr_in($port, $dest_serv_ip); warn "Opening connection to $dest_serv:$port (" . inet_ntoa($dest_serv_ip) . ")" if $trace>2; my $proto = getprotobyname('tcp'); if (socket (SSLCAT_S, &PF_INET(), &SOCK_STREAM(), $proto)) { warn "next connect" if $trace>3; if (CORE::connect (SSLCAT_S, $sin)) { my $old_out = select (SSLCAT_S); $| = 1; select ($old_out); warn "connected to $dest_serv, $port" if $trace>3; return wantarray ? (1, undef) : 1; # Success } } $errs = "$0 $$: open_tcp_connection: failed `$dest_serv', $port ($!)\n"; warn $errs if $trace; close SSLCAT_S; return wantarray ? (0, $errs) : 0; # Fail } # end of Net::SSLeay::open_tcp_connection 1;
Close