Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.138.32.53
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
libxml2-python-2.9.1 /
[ HOME SHELL ]
Name
Size
Permission
Action
TODO
1.58
KB
-rw-r--r--
apibuild.py
79.75
KB
-rwxr-xr-x
attribs.py
819
B
-rwxr-xr-x
build.py
1.51
KB
-rwxr-xr-x
compareNodes.py
1.48
KB
-rwxr-xr-x
ctxterror.py
1.29
KB
-rwxr-xr-x
cutnpaste.py
1.26
KB
-rwxr-xr-x
dtdvalid.py
619
B
-rwxr-xr-x
error.py
1.04
KB
-rwxr-xr-x
inbuf.py
498
B
-rwxr-xr-x
index.py
32.14
KB
-rwxr-xr-x
indexes.py
2.9
KB
-rwxr-xr-x
input_callback.py
5.01
KB
-rwxr-xr-x
libxml2class.txt
22.42
KB
-rw-r--r--
nsdel.py
1.55
KB
-rwxr-xr-x
outbuf.py
3.07
KB
-rwxr-xr-x
push.py
769
B
-rwxr-xr-x
pushSAX.py
1.46
KB
-rwxr-xr-x
pushSAXhtml.py
1.57
KB
-rwxr-xr-x
python.html
19.46
KB
-rw-r--r--
reader.py
12.23
KB
-rwxr-xr-x
reader2.py
5.22
KB
-rwxr-xr-x
reader3.py
4.06
KB
-rwxr-xr-x
reader4.py
1.15
KB
-rwxr-xr-x
reader5.py
1.22
KB
-rwxr-xr-x
reader6.py
2.61
KB
-rwxr-xr-x
reader7.py
1.72
KB
-rwxr-xr-x
reader8.py
683
B
-rwxr-xr-x
readererr.py
1.25
KB
-rwxr-xr-x
readernext.py
2.43
KB
-rwxr-xr-x
regexp.py
716
B
-rwxr-xr-x
relaxng.py
1.17
KB
-rwxr-xr-x
resolver.py
857
B
-rwxr-xr-x
schema.py
1.28
KB
-rwxr-xr-x
serialize.py
4.18
KB
-rwxr-xr-x
sync.py
3.44
KB
-rwxr-xr-x
thread2.py
2.25
KB
-rwxr-xr-x
tst.py
587
B
-rwxr-xr-x
tstLastError.py
2.83
KB
-rwxr-xr-x
tstURI.py
1.08
KB
-rwxr-xr-x
tstmem.py
720
B
-rwxr-xr-x
tstxpath.py
1.43
KB
-rwxr-xr-x
validDTD.py
1.2
KB
-rwxr-xr-x
validRNG.py
1.9
KB
-rwxr-xr-x
validSchemas.py
2.02
KB
-rwxr-xr-x
validate.py
1.68
KB
-rwxr-xr-x
walker.py
2.35
KB
-rwxr-xr-x
xpath.py
1.17
KB
-rwxr-xr-x
xpathext.py
1.1
KB
-rwxr-xr-x
xpathleak.py
1.53
KB
-rwxr-xr-x
xpathns.py
552
B
-rwxr-xr-x
xpathret.py
1.29
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : pushSAXhtml.py
#!/usr/bin/python -u import sys import libxml2 # Memory debug specific libxml2.debugMemory(1) log = "" class callback: def startDocument(self): global log log = log + "startDocument:" def endDocument(self): global log log = log + "endDocument:" def startElement(self, tag, attrs): global log log = log + "startElement %s %s:" % (tag, attrs) def endElement(self, tag): global log log = log + "endElement %s:" % (tag) def characters(self, data): global log log = log + "characters: %s:" % (data) def warning(self, msg): global log log = log + "warning: %s:" % (msg) def error(self, msg): global log log = log + "error: %s:" % (msg) def fatalError(self, msg): global log log = log + "fatalError: %s:" % (msg) handler = callback() ctxt = libxml2.htmlCreatePushParser(handler, "<foo", 4, "test.xml") chunk = " url='tst'>b" ctxt.htmlParseChunk(chunk, len(chunk), 0) chunk = "ar</foo>" ctxt.htmlParseChunk(chunk, len(chunk), 1) ctxt=None reference = """startDocument:startElement html None:startElement body None:startElement foo {'url': 'tst'}:error: Tag foo invalid :characters: bar:endElement foo:endElement body:endElement html:endDocument:""" if log != reference: print("Error got: %s" % log) print("Exprected: %s" % reference) sys.exit(1) # Memory debug specific libxml2.cleanupParser() if libxml2.debugMemory(1) == 0: print("OK") else: print("Memory leak %d bytes" % (libxml2.debugMemory(1))) libxml2.dumpMemory()
Close