Linux ubuntu22 5.15.0-133-generic #144-Ubuntu SMP Fri Feb 7 20:47:38 UTC 2025 x86_64
nginx/1.18.0
: 128.199.27.159 | : 216.73.216.1
Cant Read [ /etc/named.conf ]
8.1.31
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
html /
amatya /
node_modules /
node-forge /
lib /
[ HOME SHELL ]
Name
Size
Permission
Action
aes.js
38.12
KB
-rw-r--r--
aesCipherSuites.js
8.92
KB
-rw-r--r--
asn1.js
41.06
KB
-rw-r--r--
baseN.js
4.95
KB
-rw-r--r--
cipher.js
6.51
KB
-rw-r--r--
cipherModes.js
27.94
KB
-rw-r--r--
debug.js
2.03
KB
-rw-r--r--
des.js
19.96
KB
-rw-r--r--
ed25519.js
21.69
KB
-rw-r--r--
forge.js
200
B
-rw-r--r--
form.js
3.79
KB
-rw-r--r--
hmac.js
3.74
KB
-rw-r--r--
http.js
38.55
KB
-rw-r--r--
index.all.js
366
B
-rw-r--r--
index.js
679
B
-rw-r--r--
jsbn.js
34.36
KB
-rw-r--r--
kem.js
5.09
KB
-rw-r--r--
log.js
8.96
KB
-rw-r--r--
md.all.js
251
B
-rw-r--r--
md.js
253
B
-rw-r--r--
md5.js
7.8
KB
-rw-r--r--
mgf.js
274
B
-rw-r--r--
mgf1.js
1.61
KB
-rw-r--r--
oids.js
5.88
KB
-rw-r--r--
pbe.js
30.27
KB
-rw-r--r--
pbkdf2.js
5.67
KB
-rw-r--r--
pem.js
6.3
KB
-rw-r--r--
pkcs1.js
8.18
KB
-rw-r--r--
pkcs12.js
32.57
KB
-rw-r--r--
pkcs7.js
38.35
KB
-rw-r--r--
pkcs7asn1.js
11.19
KB
-rw-r--r--
pki.js
2.59
KB
-rw-r--r--
prime.js
8.57
KB
-rw-r--r--
prime.worker.js
4.69
KB
-rw-r--r--
prng.js
12.06
KB
-rw-r--r--
pss.js
7.67
KB
-rw-r--r--
random.js
5.31
KB
-rw-r--r--
rc2.js
11.67
KB
-rw-r--r--
rsa.js
53.9
KB
-rw-r--r--
sha1.js
8.88
KB
-rw-r--r--
sha256.js
9.35
KB
-rw-r--r--
sha512.js
16.73
KB
-rw-r--r--
socket.js
8.13
KB
-rw-r--r--
ssh.js
7
KB
-rw-r--r--
task.js
19.32
KB
-rw-r--r--
tls.js
129.37
KB
-rw-r--r--
tlssocket.js
6.8
KB
-rw-r--r--
util.js
76.36
KB
-rw-r--r--
x509.js
100.2
KB
-rw-r--r--
xhr.js
21.57
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : random.js
/** * An API for getting cryptographically-secure random bytes. The bytes are * generated using the Fortuna algorithm devised by Bruce Schneier and * Niels Ferguson. * * Getting strong random bytes is not yet easy to do in javascript. The only * truish random entropy that can be collected is from the mouse, keyboard, or * from timing with respect to page loads, etc. This generator makes a poor * attempt at providing random bytes when those sources haven't yet provided * enough entropy to initially seed or to reseed the PRNG. * * @author Dave Longley * * Copyright (c) 2009-2014 Digital Bazaar, Inc. */ var forge = require('./forge'); require('./aes'); require('./sha256'); require('./prng'); require('./util'); (function() { // forge.random already defined if(forge.random && forge.random.getBytes) { module.exports = forge.random; return; } (function(jQuery) { // the default prng plugin, uses AES-128 var prng_aes = {}; var _prng_aes_output = new Array(4); var _prng_aes_buffer = forge.util.createBuffer(); prng_aes.formatKey = function(key) { // convert the key into 32-bit integers var tmp = forge.util.createBuffer(key); key = new Array(4); key[0] = tmp.getInt32(); key[1] = tmp.getInt32(); key[2] = tmp.getInt32(); key[3] = tmp.getInt32(); // return the expanded key return forge.aes._expandKey(key, false); }; prng_aes.formatSeed = function(seed) { // convert seed into 32-bit integers var tmp = forge.util.createBuffer(seed); seed = new Array(4); seed[0] = tmp.getInt32(); seed[1] = tmp.getInt32(); seed[2] = tmp.getInt32(); seed[3] = tmp.getInt32(); return seed; }; prng_aes.cipher = function(key, seed) { forge.aes._updateBlock(key, seed, _prng_aes_output, false); _prng_aes_buffer.putInt32(_prng_aes_output[0]); _prng_aes_buffer.putInt32(_prng_aes_output[1]); _prng_aes_buffer.putInt32(_prng_aes_output[2]); _prng_aes_buffer.putInt32(_prng_aes_output[3]); return _prng_aes_buffer.getBytes(); }; prng_aes.increment = function(seed) { // FIXME: do we care about carry or signed issues? ++seed[3]; return seed; }; prng_aes.md = forge.md.sha256; /** * Creates a new PRNG. */ function spawnPrng() { var ctx = forge.prng.create(prng_aes); /** * Gets random bytes. If a native secure crypto API is unavailable, this * method tries to make the bytes more unpredictable by drawing from data that * can be collected from the user of the browser, eg: mouse movement. * * If a callback is given, this method will be called asynchronously. * * @param count the number of random bytes to get. * @param [callback(err, bytes)] called once the operation completes. * * @return the random bytes in a string. */ ctx.getBytes = function(count, callback) { return ctx.generate(count, callback); }; /** * Gets random bytes asynchronously. If a native secure crypto API is * unavailable, this method tries to make the bytes more unpredictable by * drawing from data that can be collected from the user of the browser, * eg: mouse movement. * * @param count the number of random bytes to get. * * @return the random bytes in a string. */ ctx.getBytesSync = function(count) { return ctx.generate(count); }; return ctx; } // create default prng context var _ctx = spawnPrng(); // add other sources of entropy only if window.crypto.getRandomValues is not // available -- otherwise this source will be automatically used by the prng var getRandomValues = null; if(typeof window !== 'undefined') { var _crypto = window.crypto || window.msCrypto; if(_crypto && _crypto.getRandomValues) { getRandomValues = function(arr) { return _crypto.getRandomValues(arr); }; } } if(forge.options.usePureJavaScript || (!forge.util.isNodejs && !getRandomValues)) { // if this is a web worker, do not use weak entropy, instead register to // receive strong entropy asynchronously from the main thread if(typeof window === 'undefined' || window.document === undefined) { // FIXME: } // get load time entropy _ctx.collectInt(+new Date(), 32); // add some entropy from navigator object if(typeof(navigator) !== 'undefined') { var _navBytes = ''; for(var key in navigator) { try { if(typeof(navigator[key]) == 'string') { _navBytes += navigator[key]; } } catch(e) { /* Some navigator keys might not be accessible, e.g. the geolocation attribute throws an exception if touched in Mozilla chrome:// context. Silently ignore this and just don't use this as a source of entropy. */ } } _ctx.collect(_navBytes); _navBytes = null; } // add mouse and keyboard collectors if jquery is available if(jQuery) { // set up mouse entropy capture jQuery().mousemove(function(e) { // add mouse coords _ctx.collectInt(e.clientX, 16); _ctx.collectInt(e.clientY, 16); }); // set up keyboard entropy capture jQuery().keypress(function(e) { _ctx.collectInt(e.charCode, 8); }); } } /* Random API */ if(!forge.random) { forge.random = _ctx; } else { // extend forge.random with _ctx for(var key in _ctx) { forge.random[key] = _ctx[key]; } } // expose spawn PRNG forge.random.createInstance = spawnPrng; module.exports = forge.random; })(typeof(jQuery) !== 'undefined' ? jQuery : null); })();
Close