Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 18.116.10.48
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
python2.7 /
site-packages /
passlib /
[ HOME SHELL ]
Name
Size
Permission
Action
_data
[ DIR ]
drwxr-xr-x
_setup
[ DIR ]
drwxr-xr-x
crypto
[ DIR ]
drwxr-xr-x
ext
[ DIR ]
drwxr-xr-x
handlers
[ DIR ]
drwxr-xr-x
tests
[ DIR ]
drwxr-xr-x
utils
[ DIR ]
drwxr-xr-x
__init__.py
87
B
-rw-r--r--
__init__.pyc
253
B
-rw-r--r--
__init__.pyo
253
B
-rw-r--r--
apache.py
45.34
KB
-rw-r--r--
apache.pyc
36.91
KB
-rw-r--r--
apache.pyo
36.65
KB
-rw-r--r--
apps.py
6.73
KB
-rw-r--r--
apps.pyc
3.94
KB
-rw-r--r--
apps.pyo
3.94
KB
-rw-r--r--
context.py
106.48
KB
-rw-r--r--
context.pyc
81.25
KB
-rw-r--r--
context.pyo
80.83
KB
-rw-r--r--
exc.py
11.31
KB
-rw-r--r--
exc.pyc
12.71
KB
-rw-r--r--
exc.pyo
12.71
KB
-rw-r--r--
hash.py
3.62
KB
-rw-r--r--
hash.pyc
3.8
KB
-rw-r--r--
hash.pyo
3.8
KB
-rw-r--r--
hosts.py
3.22
KB
-rw-r--r--
hosts.pyc
1.35
KB
-rw-r--r--
hosts.pyo
1.35
KB
-rw-r--r--
ifc.py
13.86
KB
-rw-r--r--
ifc.pyc
7.44
KB
-rw-r--r--
ifc.pyo
7.44
KB
-rw-r--r--
pwd.py
27.9
KB
-rw-r--r--
pwd.pyc
23.2
KB
-rw-r--r--
pwd.pyo
23.08
KB
-rw-r--r--
registry.py
19.6
KB
-rw-r--r--
registry.pyc
15.93
KB
-rw-r--r--
registry.pyo
15.77
KB
-rw-r--r--
totp.py
70.73
KB
-rw-r--r--
totp.pyc
56.74
KB
-rw-r--r--
totp.pyo
55.93
KB
-rw-r--r--
win32.py
2.53
KB
-rw-r--r--
win32.pyc
2.05
KB
-rw-r--r--
win32.pyo
2.05
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : hosts.py
"""passlib.hosts""" #============================================================================= # imports #============================================================================= # core from warnings import warn # pkg from passlib.context import LazyCryptContext from passlib.exc import PasslibRuntimeWarning from passlib import registry from passlib.utils import has_crypt, unix_crypt_schemes # local __all__ = [ "linux_context", "linux2_context", "openbsd_context", "netbsd_context", "freebsd_context", "host_context", ] #============================================================================= # linux support #============================================================================= # known platform names - linux2 linux_context = linux2_context = LazyCryptContext( schemes = [ "sha512_crypt", "sha256_crypt", "md5_crypt", "des_crypt", "unix_disabled" ], deprecated = [ "des_crypt" ], ) #============================================================================= # bsd support #============================================================================= # known platform names - # freebsd2 # freebsd3 # freebsd4 # freebsd5 # freebsd6 # freebsd7 # # netbsd1 # referencing source via -http://fxr.googlebit.com # freebsd 6,7,8 - des, md5, bcrypt, bsd_nthash # netbsd - des, ext, md5, bcrypt, sha1 # openbsd - des, ext, md5, bcrypt freebsd_context = LazyCryptContext(["bcrypt", "md5_crypt", "bsd_nthash", "des_crypt", "unix_disabled"]) openbsd_context = LazyCryptContext(["bcrypt", "md5_crypt", "bsdi_crypt", "des_crypt", "unix_disabled"]) netbsd_context = LazyCryptContext(["bcrypt", "sha1_crypt", "md5_crypt", "bsdi_crypt", "des_crypt", "unix_disabled"]) # XXX: include darwin in this list? it's got a BSD crypt variant, # but that's not what it uses for user passwords. #============================================================================= # current host #============================================================================= if registry.os_crypt_present: # NOTE: this is basically mimicing the output of os crypt(), # except that it uses passlib's (usually stronger) defaults settings, # and can be inspected and used much more flexibly. def _iter_os_crypt_schemes(): """helper which iterates over supported os_crypt schemes""" out = registry.get_supported_os_crypt_schemes() if out: # only offer disabled handler if there's another scheme in front, # as this can't actually hash any passwords out += ("unix_disabled",) return out host_context = LazyCryptContext(_iter_os_crypt_schemes()) #============================================================================= # other platforms #============================================================================= # known platform strings - # aix3 # aix4 # atheos # beos5 # darwin # generic # hp-ux11 # irix5 # irix6 # mac # next3 # os2emx # riscos # sunos5 # unixware7 #============================================================================= # eof #=============================================================================
Close