Linux ubuntu22 5.15.0-133-generic #144-Ubuntu SMP Fri Feb 7 20:47:38 UTC 2025 x86_64
nginx/1.18.0
: 128.199.27.159 | : 216.73.216.1
Cant Read [ /etc/named.conf ]
8.1.31
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
snap /
lxd /
31333 /
share /
openvswitch /
python /
ovs /
[ HOME SHELL ]
Name
Size
Permission
Action
compat
[ DIR ]
drwxr-xr-x
db
[ DIR ]
drwxr-xr-x
flow
[ DIR ]
drwxr-xr-x
unixctl
[ DIR ]
drwxr-xr-x
__init__.py
38
B
-rw-r--r--
daemon.py
20.22
KB
-rw-r--r--
dirs.py
1.29
KB
-rw-r--r--
dns_resolve.py
9.51
KB
-rw-r--r--
fatal_signal.py
4.65
KB
-rw-r--r--
fcntl_win.py
1.3
KB
-rw-r--r--
json.py
16.45
KB
-rw-r--r--
jsonrpc.py
20.6
KB
-rw-r--r--
ovsuuid.py
1.83
KB
-rw-r--r--
poller.py
10.04
KB
-rw-r--r--
process.py
1.43
KB
-rw-r--r--
reconnect.py
25.4
KB
-rw-r--r--
socket_util.py
12.19
KB
-rw-r--r--
stream.py
31.43
KB
-rw-r--r--
timeval.py
2.38
KB
-rw-r--r--
util.py
3.05
KB
-rw-r--r--
version.py
93
B
-rw-r--r--
vlog.py
16.3
KB
-rw-r--r--
winutils.py
9.01
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : fcntl_win.py
# Copyright (c) 2016 Cloudbase Solutions Srl # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at: # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. import errno import msvcrt import pywintypes import win32con import win32file LOCK_EX = win32con.LOCKFILE_EXCLUSIVE_LOCK LOCK_SH = 0 # the default LOCK_NB = win32con.LOCKFILE_FAIL_IMMEDIATELY LOCK_UN = 0x80000000 # unlock - non-standard def lockf(fd, flags, length=0xFFFF0000, start=0, whence=0): overlapped = pywintypes.OVERLAPPED() hfile = msvcrt.get_osfhandle(fd.fileno()) if LOCK_UN & flags: ret = win32file.UnlockFileEx(hfile, 0, start, length, overlapped) else: try: ret = win32file.LockFileEx(hfile, flags, start, length, overlapped) except: raise IOError(errno.EAGAIN, "", "") return ret def flock(fd, flags): lockf(fd, flags, 0xFFFF0000, 0, 0)
Close