Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 52.14.252.16
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib64 /
python2.7 /
Demo /
sockets /
[ HOME SHELL ]
Name
Size
Permission
Action
README
628
B
-rw-r--r--
broadcast.py
283
B
-rw-r--r--
broadcast.pyc
546
B
-rw-r--r--
broadcast.pyo
546
B
-rw-r--r--
echosvr.py
739
B
-rwxr-xr-x
echosvr.pyc
826
B
-rw-r--r--
echosvr.pyo
826
B
-rw-r--r--
finger.py
1.23
KB
-rwxr-xr-x
finger.pyc
1.13
KB
-rw-r--r--
finger.pyo
1.13
KB
-rw-r--r--
ftp.py
3.84
KB
-rw-r--r--
ftp.pyc
2.88
KB
-rw-r--r--
ftp.pyo
2.88
KB
-rw-r--r--
gopher.py
9.55
KB
-rwxr-xr-x
gopher.pyc
10.08
KB
-rw-r--r--
gopher.pyo
10.08
KB
-rw-r--r--
mcast.py
2.16
KB
-rwxr-xr-x
mcast.pyc
2.12
KB
-rw-r--r--
mcast.pyo
2.12
KB
-rw-r--r--
radio.py
287
B
-rw-r--r--
radio.pyc
470
B
-rw-r--r--
radio.pyo
470
B
-rw-r--r--
rpython.py
714
B
-rwxr-xr-x
rpython.pyc
981
B
-rw-r--r--
rpython.pyo
981
B
-rw-r--r--
rpythond.py
1.19
KB
-rwxr-xr-x
rpythond.pyc
1.3
KB
-rw-r--r--
rpythond.pyo
1.3
KB
-rw-r--r--
telnet.py
2.94
KB
-rwxr-xr-x
telnet.pyc
2.1
KB
-rw-r--r--
telnet.pyo
2.1
KB
-rw-r--r--
throughput.py
2.04
KB
-rwxr-xr-x
throughput.pyc
2.41
KB
-rw-r--r--
throughput.pyo
2.41
KB
-rw-r--r--
udpecho.py
1.43
KB
-rwxr-xr-x
udpecho.pyc
1.98
KB
-rw-r--r--
udpecho.pyo
1.98
KB
-rw-r--r--
unicast.py
230
B
-rw-r--r--
unicast.pyc
455
B
-rw-r--r--
unicast.pyo
455
B
-rw-r--r--
unixclient.py
232
B
-rw-r--r--
unixclient.pyc
424
B
-rw-r--r--
unixclient.pyo
424
B
-rw-r--r--
unixserver.py
414
B
-rw-r--r--
unixserver.pyc
593
B
-rw-r--r--
unixserver.pyo
593
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : mcast.py
#! /usr/bin/env python # # Send/receive UDP multicast packets. # Requires that your OS kernel supports IP multicast. # # Usage: # mcast -s (sender, IPv4) # mcast -s -6 (sender, IPv6) # mcast (receivers, IPv4) # mcast -6 (receivers, IPv6) MYPORT = 8123 MYGROUP_4 = '225.0.0.250' MYGROUP_6 = 'ff15:7079:7468:6f6e:6465:6d6f:6d63:6173' MYTTL = 1 # Increase to reach other networks import time import struct import socket import sys def main(): group = MYGROUP_6 if "-6" in sys.argv[1:] else MYGROUP_4 if "-s" in sys.argv[1:]: sender(group) else: receiver(group) def sender(group): addrinfo = socket.getaddrinfo(group, None)[0] s = socket.socket(addrinfo[0], socket.SOCK_DGRAM) # Set Time-to-live (optional) ttl_bin = struct.pack('@i', MYTTL) if addrinfo[0] == socket.AF_INET: # IPv4 s.setsockopt(socket.IPPROTO_IP, socket.IP_MULTICAST_TTL, ttl_bin) else: s.setsockopt(socket.IPPROTO_IPV6, socket.IPV6_MULTICAST_HOPS, ttl_bin) while True: data = repr(time.time()) s.sendto(data + '\0', (addrinfo[4][0], MYPORT)) time.sleep(1) def receiver(group): # Look up multicast group address in name server and find out IP version addrinfo = socket.getaddrinfo(group, None)[0] # Create a socket s = socket.socket(addrinfo[0], socket.SOCK_DGRAM) # Allow multiple copies of this program on one machine # (not strictly needed) s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1) # Bind it to the port s.bind(('', MYPORT)) group_bin = socket.inet_pton(addrinfo[0], addrinfo[4][0]) # Join group if addrinfo[0] == socket.AF_INET: # IPv4 mreq = group_bin + struct.pack('=I', socket.INADDR_ANY) s.setsockopt(socket.IPPROTO_IP, socket.IP_ADD_MEMBERSHIP, mreq) else: mreq = group_bin + struct.pack('@I', 0) s.setsockopt(socket.IPPROTO_IPV6, socket.IPV6_JOIN_GROUP, mreq) # Loop, printing any data we receive while True: data, sender = s.recvfrom(1500) while data[-1:] == '\0': data = data[:-1] # Strip trailing \0's print (str(sender) + ' ' + repr(data)) if __name__ == '__main__': main()
Close