Linux cyberpanel 5.15.0-156-generic #166-Ubuntu SMP Sat Aug 9 00:02:46 UTC 2025 x86_64
LiteSpeed
: 160.191.175.3 | : 216.73.216.114
Cant Read [ /etc/named.conf ]
8.2.29
aodai6801
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
python3 /
dist-packages /
pyasn1_modules /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
__init__.py
65
B
-rw-r--r--
pem.py
2
KB
-rw-r--r--
rfc1155.py
2.61
KB
-rw-r--r--
rfc1157.py
3.46
KB
-rw-r--r--
rfc1901.py
640
B
-rw-r--r--
rfc1902.py
3.61
KB
-rw-r--r--
rfc1905.py
4.72
KB
-rw-r--r--
rfc2251.py
26.29
KB
-rw-r--r--
rfc2314.py
1.28
KB
-rw-r--r--
rfc2315.py
9.42
KB
-rw-r--r--
rfc2437.py
2.56
KB
-rw-r--r--
rfc2459.py
48.84
KB
-rw-r--r--
rfc2511.py
10.12
KB
-rw-r--r--
rfc2560.py
8.2
KB
-rw-r--r--
rfc3279.py
5.83
KB
-rw-r--r--
rfc3280.py
45.57
KB
-rw-r--r--
rfc3281.py
9.63
KB
-rw-r--r--
rfc3412.py
1.9
KB
-rw-r--r--
rfc3414.py
1.13
KB
-rw-r--r--
rfc3447.py
1.57
KB
-rw-r--r--
rfc3852.py
19.64
KB
-rw-r--r--
rfc4210.py
27.71
KB
-rw-r--r--
rfc4211.py
11.83
KB
-rw-r--r--
rfc5208.py
1.39
KB
-rw-r--r--
rfc5280.py
48.34
KB
-rw-r--r--
rfc5652.py
19.64
KB
-rw-r--r--
rfc6402.py
14.67
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : pem.py
# # This file is part of pyasn1-modules software. # # Copyright (c) 2005-2017, Ilya Etingof <etingof@gmail.com> # License: http://pyasn1.sf.net/license.html # import base64 import sys stSpam, stHam, stDump = 0, 1, 2 # The markers parameters is in form ('start1', 'stop1'), ('start2', 'stop2')... # Return is (marker-index, substrate) def readPemBlocksFromFile(fileObj, *markers): startMarkers = dict(map(lambda x: (x[1], x[0]), enumerate(map(lambda y: y[0], markers)))) stopMarkers = dict(map(lambda x: (x[1], x[0]), enumerate(map(lambda y: y[1], markers)))) idx = -1 substrate = '' certLines = [] state = stSpam while True: certLine = fileObj.readline() if not certLine: break certLine = certLine.strip() if state == stSpam: if certLine in startMarkers: certLines = [] idx = startMarkers[certLine] state = stHam continue if state == stHam: if certLine in stopMarkers and stopMarkers[certLine] == idx: state = stDump else: certLines.append(certLine) if state == stDump: if sys.version_info[0] <= 2: substrate = ''.join([base64.b64decode(x) for x in certLines]) else: substrate = ''.encode().join([base64.b64decode(x.encode()) for x in certLines]) break return idx, substrate # Backward compatibility routine def readPemFromFile(fileObj, startMarker='-----BEGIN CERTIFICATE-----', endMarker='-----END CERTIFICATE-----'): idx, substrate = readPemBlocksFromFile(fileObj, (startMarker, endMarker)) return substrate def readBase64fromText(text): if sys.version_info[0] <= 2: return base64.b64decode(text) else: return base64.b64decode(text.encode()) def readBase64FromFile(fileObj): return readBase64fromText(fileObj.read())
Close