Linux server.kiran-academy.com 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
: 194.233.91.196 | : 216.73.216.216
Cant Read [ /etc/named.conf ]
7.4.32
finalho
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
python2.7 /
site-packages /
dns /
rdtypes /
ANY /
[ HOME SHELL ]
Name
Size
Permission
Action
AFSDB.py
1.8
KB
-rw-r--r--
AFSDB.pyc
1.39
KB
-rw-r--r--
AFSDB.pyo
1.39
KB
-rw-r--r--
CAA.py
2.59
KB
-rw-r--r--
CAA.pyc
2.63
KB
-rw-r--r--
CAA.pyo
2.58
KB
-rw-r--r--
CERT.py
3.93
KB
-rw-r--r--
CERT.pyc
3.85
KB
-rw-r--r--
CERT.pyo
3.85
KB
-rw-r--r--
CNAME.py
1.06
KB
-rw-r--r--
CNAME.pyc
675
B
-rw-r--r--
CNAME.pyo
675
B
-rw-r--r--
DLV.py
862
B
-rw-r--r--
DLV.pyc
462
B
-rw-r--r--
DLV.pyo
462
B
-rw-r--r--
DNAME.py
978
B
-rw-r--r--
DNAME.pyc
698
B
-rw-r--r--
DNAME.pyo
698
B
-rw-r--r--
DNSKEY.py
4.18
KB
-rw-r--r--
DNSKEY.pyc
4.29
KB
-rw-r--r--
DNSKEY.pyo
4.29
KB
-rw-r--r--
DS.py
871
B
-rw-r--r--
DS.pyc
458
B
-rw-r--r--
DS.pyo
458
B
-rw-r--r--
GPOS.py
4.94
KB
-rw-r--r--
GPOS.pyc
4.95
KB
-rw-r--r--
GPOS.pyo
4.87
KB
-rw-r--r--
HINFO.py
2.45
KB
-rw-r--r--
HINFO.pyc
2.47
KB
-rw-r--r--
HINFO.pyo
2.41
KB
-rw-r--r--
HIP.py
4.06
KB
-rw-r--r--
HIP.pyc
3.83
KB
-rw-r--r--
HIP.pyo
3.83
KB
-rw-r--r--
ISDN.py
3.01
KB
-rw-r--r--
ISDN.pyc
2.75
KB
-rw-r--r--
ISDN.pyo
2.68
KB
-rw-r--r--
LOC.py
12.4
KB
-rw-r--r--
LOC.pyc
10.18
KB
-rw-r--r--
LOC.pyo
10.18
KB
-rw-r--r--
MX.py
871
B
-rw-r--r--
MX.pyc
458
B
-rw-r--r--
MX.pyo
458
B
-rw-r--r--
NS.py
871
B
-rw-r--r--
NS.pyc
458
B
-rw-r--r--
NS.pyo
458
B
-rw-r--r--
NSEC.py
4.64
KB
-rw-r--r--
NSEC.pyc
4.11
KB
-rw-r--r--
NSEC.pyo
4.11
KB
-rw-r--r--
NSEC3.py
6.46
KB
-rw-r--r--
NSEC3.pyc
5.32
KB
-rw-r--r--
NSEC3.pyo
5.32
KB
-rw-r--r--
NSEC3PARAM.py
2.92
KB
-rw-r--r--
NSEC3PARAM.pyc
2.82
KB
-rw-r--r--
NSEC3PARAM.pyo
2.82
KB
-rw-r--r--
PTR.py
873
B
-rw-r--r--
PTR.pyc
462
B
-rw-r--r--
PTR.pyo
462
B
-rw-r--r--
RP.py
3.06
KB
-rw-r--r--
RP.pyc
2.93
KB
-rw-r--r--
RP.pyo
2.93
KB
-rw-r--r--
RRSIG.py
5.57
KB
-rw-r--r--
RRSIG.pyc
5.5
KB
-rw-r--r--
RRSIG.pyo
5.5
KB
-rw-r--r--
RT.py
889
B
-rw-r--r--
RT.pyc
476
B
-rw-r--r--
RT.pyo
476
B
-rw-r--r--
SOA.py
4.48
KB
-rw-r--r--
SOA.pyc
4.03
KB
-rw-r--r--
SOA.pyo
4.03
KB
-rw-r--r--
SPF.py
897
B
-rw-r--r--
SPF.pyc
485
B
-rw-r--r--
SPF.pyo
485
B
-rw-r--r--
SSHFP.py
2.79
KB
-rw-r--r--
SSHFP.pyc
2.67
KB
-rw-r--r--
SSHFP.pyo
2.67
KB
-rw-r--r--
TLSA.py
2.91
KB
-rw-r--r--
TLSA.pyc
2.81
KB
-rw-r--r--
TLSA.pyo
2.81
KB
-rw-r--r--
TXT.py
876
B
-rw-r--r--
TXT.pyc
465
B
-rw-r--r--
TXT.pyo
465
B
-rw-r--r--
URI.py
2.71
KB
-rw-r--r--
URI.pyc
2.72
KB
-rw-r--r--
URI.pyo
2.72
KB
-rw-r--r--
X25.py
1.98
KB
-rw-r--r--
X25.pyc
2.12
KB
-rw-r--r--
X25.pyo
2.08
KB
-rw-r--r--
__init__.py
1.14
KB
-rw-r--r--
__init__.pyc
602
B
-rw-r--r--
__init__.pyo
602
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : DNSKEY.py
# Copyright (C) 2004-2007, 2009-2011 Nominum, Inc. # # Permission to use, copy, modify, and distribute this software and its # documentation for any purpose with or without fee is hereby granted, # provided that the above copyright notice and this permission notice # appear in all copies. # # THE SOFTWARE IS PROVIDED "AS IS" AND NOMINUM DISCLAIMS ALL WARRANTIES # WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF # MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL NOMINUM BE LIABLE FOR # ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES # WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN # ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT # OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. import struct import dns.exception import dns.dnssec import dns.rdata # flag constants SEP = 0x0001 REVOKE = 0x0080 ZONE = 0x0100 _flag_by_text = { 'SEP': SEP, 'REVOKE': REVOKE, 'ZONE': ZONE } # We construct the inverse mapping programmatically to ensure that we # cannot make any mistakes (e.g. omissions, cut-and-paste errors) that # would cause the mapping not to be true inverse. _flag_by_value = dict([(y, x) for x, y in _flag_by_text.iteritems()]) def flags_to_text_set(flags): """Convert a DNSKEY flags value to set texts @rtype: set([string])""" flags_set = set() mask = 0x1 while mask <= 0x8000: if flags & mask: text = _flag_by_value.get(mask) if not text: text = hex(mask) flags_set.add(text) mask <<= 1 return flags_set def flags_from_text_set(texts_set): """Convert set of DNSKEY flag mnemonic texts to DNSKEY flag value @rtype: int""" flags = 0 for text in texts_set: try: flags += _flag_by_text[text] except KeyError: raise NotImplementedError( "DNSKEY flag '%s' is not supported" % text) return flags class DNSKEY(dns.rdata.Rdata): """DNSKEY record @ivar flags: the key flags @type flags: int @ivar protocol: the protocol for which this key may be used @type protocol: int @ivar algorithm: the algorithm used for the key @type algorithm: int @ivar key: the public key @type key: string""" __slots__ = ['flags', 'protocol', 'algorithm', 'key'] def __init__(self, rdclass, rdtype, flags, protocol, algorithm, key): super(DNSKEY, self).__init__(rdclass, rdtype) self.flags = flags self.protocol = protocol self.algorithm = algorithm self.key = key def to_text(self, origin=None, relativize=True, **kw): return '%d %d %d %s' % (self.flags, self.protocol, self.algorithm, dns.rdata._base64ify(self.key)) def from_text(cls, rdclass, rdtype, tok, origin = None, relativize = True): flags = tok.get_uint16() protocol = tok.get_uint8() algorithm = dns.dnssec.algorithm_from_text(tok.get_string()) chunks = [] while 1: t = tok.get().unescape() if t.is_eol_or_eof(): break if not t.is_identifier(): raise dns.exception.SyntaxError chunks.append(t.value) b64 = ''.join(chunks) key = b64.decode('base64_codec') return cls(rdclass, rdtype, flags, protocol, algorithm, key) from_text = classmethod(from_text) def to_wire(self, file, compress = None, origin = None): header = struct.pack("!HBB", self.flags, self.protocol, self.algorithm) file.write(header) file.write(self.key) def from_wire(cls, rdclass, rdtype, wire, current, rdlen, origin = None): if rdlen < 4: raise dns.exception.FormError header = struct.unpack('!HBB', wire[current : current + 4]) current += 4 rdlen -= 4 key = wire[current : current + rdlen].unwrap() return cls(rdclass, rdtype, header[0], header[1], header[2], key) from_wire = classmethod(from_wire) def flags_to_text_set(self): """Convert a DNSKEY flags value to set texts @rtype: set([string])""" return flags_to_text_set(self.flags)
Close