Linux server.kiran-academy.com 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
: 194.233.91.196 | : 216.73.216.216
Cant Read [ /etc/named.conf ]
7.4.32
finalho
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
perl5 /
vendor_perl /
JSON /
WebToken /
Crypt /
[ HOME SHELL ]
Name
Size
Permission
Action
HMAC.pm
657
B
-rw-r--r--
RSA.pm
870
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : RSA.pm
package JSON::WebToken::Crypt::RSA; use strict; use warnings; use parent 'JSON::WebToken::Crypt'; use Crypt::OpenSSL::RSA (); our $ALGORITHM2SIGNING_METHOD_MAP = { RS256 => 'use_sha256_hash', RS384 => 'use_sha384_hash', RS512 => 'use_sha512_hash', RSA1_5 => 'use_pkcs1_padding', }; sub sign { my ($class, $algorithm, $message, $key) = @_; my $private_key = Crypt::OpenSSL::RSA->new_private_key($key); my $method = $ALGORITHM2SIGNING_METHOD_MAP->{$algorithm}; $private_key->$method; return $private_key->sign($message); } sub verify { my ($class, $algorithm, $message, $key, $signature) = @_; my $public_key = Crypt::OpenSSL::RSA->new_public_key($key); my $method = $ALGORITHM2SIGNING_METHOD_MAP->{$algorithm}; $public_key->$method; return $public_key->verify($message, $signature) ? 1 : 0; } 1; __END__
Close