Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.149.239.79
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib64 /
python2.7 /
site-packages /
dns /
rdtypes /
IN /
[ HOME SHELL ]
Name
Size
Permission
Action
A.py
2.01
KB
-rw-r--r--
A.pyc
2.23
KB
-rw-r--r--
A.pyo
2.23
KB
-rw-r--r--
AAAA.py
2.13
KB
-rw-r--r--
AAAA.pyc
2.32
KB
-rw-r--r--
AAAA.pyo
2.32
KB
-rw-r--r--
APL.py
5.4
KB
-rw-r--r--
APL.pyc
5.32
KB
-rw-r--r--
APL.pyo
5.29
KB
-rw-r--r--
DHCID.py
2.07
KB
-rw-r--r--
DHCID.pyc
2.34
KB
-rw-r--r--
DHCID.pyo
2.34
KB
-rw-r--r--
IPSECKEY.py
5.85
KB
-rw-r--r--
IPSECKEY.pyc
4.89
KB
-rw-r--r--
IPSECKEY.pyo
4.89
KB
-rw-r--r--
KX.py
888
B
-rw-r--r--
KX.pyc
470
B
-rw-r--r--
KX.pyo
470
B
-rw-r--r--
NAPTR.py
4.76
KB
-rw-r--r--
NAPTR.pyc
4.37
KB
-rw-r--r--
NAPTR.pyo
4.33
KB
-rw-r--r--
NSAP.py
2.13
KB
-rw-r--r--
NSAP.pyc
2.37
KB
-rw-r--r--
NSAP.pyo
2.37
KB
-rw-r--r--
NSAP_PTR.py
900
B
-rw-r--r--
NSAP_PTR.pyc
494
B
-rw-r--r--
NSAP_PTR.pyo
494
B
-rw-r--r--
PX.py
3.67
KB
-rw-r--r--
PX.pyc
3.36
KB
-rw-r--r--
PX.pyo
3.36
KB
-rw-r--r--
SRV.py
3.32
KB
-rw-r--r--
SRV.pyc
3.26
KB
-rw-r--r--
SRV.pyo
3.26
KB
-rw-r--r--
WKS.py
4.03
KB
-rw-r--r--
WKS.pyc
3.84
KB
-rw-r--r--
WKS.pyo
3.84
KB
-rw-r--r--
__init__.py
965
B
-rw-r--r--
__init__.pyc
367
B
-rw-r--r--
__init__.pyo
367
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : WKS.py
# Copyright (C) 2003-2007, 2009-2011 Nominum, Inc. # # Permission to use, copy, modify, and distribute this software and its # documentation for any purpose with or without fee is hereby granted, # provided that the above copyright notice and this permission notice # appear in all copies. # # THE SOFTWARE IS PROVIDED "AS IS" AND NOMINUM DISCLAIMS ALL WARRANTIES # WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF # MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL NOMINUM BE LIABLE FOR # ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES # WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN # ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT # OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. import socket import struct import dns.ipv4 import dns.rdata _proto_tcp = socket.getprotobyname('tcp') _proto_udp = socket.getprotobyname('udp') class WKS(dns.rdata.Rdata): """WKS record @ivar address: the address @type address: string @ivar protocol: the protocol @type protocol: int @ivar bitmap: the bitmap @type bitmap: string @see: RFC 1035""" __slots__ = ['address', 'protocol', 'bitmap'] def __init__(self, rdclass, rdtype, address, protocol, bitmap): super(WKS, self).__init__(rdclass, rdtype) self.address = address self.protocol = protocol self.bitmap = bitmap def to_text(self, origin=None, relativize=True, **kw): bits = [] for i in xrange(0, len(self.bitmap)): byte = ord(self.bitmap[i]) for j in xrange(0, 8): if byte & (0x80 >> j): bits.append(str(i * 8 + j)) text = ' '.join(bits) return '%s %d %s' % (self.address, self.protocol, text) def from_text(cls, rdclass, rdtype, tok, origin = None, relativize = True): address = tok.get_string() protocol = tok.get_string() if protocol.isdigit(): protocol = int(protocol) else: protocol = socket.getprotobyname(protocol) bitmap = [] while 1: token = tok.get().unescape() if token.is_eol_or_eof(): break if token.value.isdigit(): serv = int(token.value) else: if protocol != _proto_udp and protocol != _proto_tcp: raise NotImplementedError("protocol must be TCP or UDP") if protocol == _proto_udp: protocol_text = "udp" else: protocol_text = "tcp" serv = socket.getservbyname(token.value, protocol_text) i = serv // 8 l = len(bitmap) if l < i + 1: for j in xrange(l, i + 1): bitmap.append('\x00') bitmap[i] = chr(ord(bitmap[i]) | (0x80 >> (serv % 8))) bitmap = dns.rdata._truncate_bitmap(bitmap) return cls(rdclass, rdtype, address, protocol, bitmap) from_text = classmethod(from_text) def to_wire(self, file, compress = None, origin = None): file.write(dns.ipv4.inet_aton(self.address)) protocol = struct.pack('!B', self.protocol) file.write(protocol) file.write(self.bitmap) def from_wire(cls, rdclass, rdtype, wire, current, rdlen, origin = None): address = dns.ipv4.inet_ntoa(wire[current : current + 4]) protocol, = struct.unpack('!B', wire[current + 4 : current + 5]) current += 5 rdlen -= 5 bitmap = wire[current : current + rdlen].unwrap() return cls(rdclass, rdtype, address, protocol, bitmap) from_wire = classmethod(from_wire) def _cmp(self, other): sa = dns.ipv4.inet_aton(self.address) oa = dns.ipv4.inet_aton(other.address) v = cmp(sa, oa) if v == 0: sp = struct.pack('!B', self.protocol) op = struct.pack('!B', other.protocol) v = cmp(sp, op) if v == 0: v = cmp(self.bitmap, other.bitmap) return v
Close