Windows NT DGPENSV2LPKMN 10.0 build 14393 (Windows Server 2016) AMD64
Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/7.3.25
: 172.16.0.66 | : 172.16.0.254
Cant Read [ /etc/named.conf ]
7.3.25
SYSTEM
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
[ A ]
[ C ]
[ D ]
C: /
laragon /
bin /
python /
python-3.10 /
Tools /
scripts /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxrwxrwx
.mad-root
0
B
-rw-rw-rw-
2to3.py
101
B
-rw-rw-rw-
abitype.py
5.64
KB
-rw-rw-rw-
analyze_dxp.py
4.21
KB
-rw-rw-rw-
byext.py
3.94
KB
-rw-rw-rw-
byteyears.py
1.67
KB
-rw-rw-rw-
checkpip.py
825
B
-rw-rw-rw-
cleanfuture.py
8.69
KB
-rw-rw-rw-
combinerefs.py
4.48
KB
-rw-rw-rw-
copytime.py
689
B
-rw-rw-rw-
crlf.py
655
B
-rw-rw-rw-
db2pickle.py
3.68
KB
-rw-rw-rw-
diff.py
2.26
KB
-rw-rw-rw-
dutree.py
1.66
KB
-rw-rw-rw-
eptags.py
1.6
KB
-rw-rw-rw-
find-uname.py
1.22
KB
-rw-rw-rw-
find_recursionlimit.py
4.03
KB
-rw-rw-rw-
finddiv.py
2.56
KB
-rw-rw-rw-
findlinksto.py
1.09
KB
-rw-rw-rw-
findnocoding.py
2.99
KB
-rw-rw-rw-
fixcid.py
10.24
KB
-rw-rw-rw-
fixdiv.py
14.28
KB
-rw-rw-rw-
fixheader.py
1.38
KB
-rw-rw-rw-
fixnotice.py
3.06
KB
-rw-rw-rw-
fixps.py
923
B
-rw-rw-rw-
generate_opcode_h.py
2.25
KB
-rw-rw-rw-
generate_stdlib_module_names.p...
4.7
KB
-rw-rw-rw-
generate_token.py
7.08
KB
-rw-rw-rw-
get-remote-certificate.py
2.7
KB
-rw-rw-rw-
google.py
526
B
-rw-rw-rw-
gprof2html.py
2.33
KB
-rw-rw-rw-
highlight.py
9.21
KB
-rw-rw-rw-
ifdef.py
3.73
KB
-rw-rw-rw-
import_diagnostics.py
1.01
KB
-rw-rw-rw-
lfcr.py
664
B
-rw-rw-rw-
linktree.py
2.46
KB
-rw-rw-rw-
lll.py
775
B
-rw-rw-rw-
mailerdaemon.py
8.09
KB
-rw-rw-rw-
make_ctype.py
2.32
KB
-rw-rw-rw-
md5sum.py
2.55
KB
-rw-rw-rw-
mkreal.py
1.66
KB
-rw-rw-rw-
ndiff.py
3.86
KB
-rw-rw-rw-
nm2def.py
2.53
KB
-rw-rw-rw-
objgraph.py
6.01
KB
-rw-rw-rw-
parse_html5_entities.py
4.01
KB
-rw-rw-rw-
parseentities.py
1.76
KB
-rw-rw-rw-
patchcheck.py
10.81
KB
-rw-rw-rw-
pathfix.py
6.85
KB
-rw-rw-rw-
pdeps.py
4.07
KB
-rw-rw-rw-
pep384_macrocheck.py
4.75
KB
-rw-rw-rw-
pickle2db.py
4.07
KB
-rw-rw-rw-
pindent.py
17.22
KB
-rw-rw-rw-
ptags.py
1.34
KB
-rw-rw-rw-
pydoc3.py
85
B
-rw-rw-rw-
pysource.py
3.9
KB
-rw-rw-rw-
reindent-rst.py
293
B
-rw-rw-rw-
reindent.py
11.7
KB
-rw-rw-rw-
rgrep.py
1.61
KB
-rw-rw-rw-
run_tests.py
1.83
KB
-rw-rw-rw-
serve.py
1.23
KB
-rw-rw-rw-
smelly.py
5.07
KB
-rw-rw-rw-
stable_abi.py
20.91
KB
-rw-rw-rw-
suff.py
536
B
-rw-rw-rw-
texi2html.py
70.75
KB
-rw-rw-rw-
untabify.py
1.32
KB
-rw-rw-rw-
update_file.py
790
B
-rw-rw-rw-
var_access_benchmark.py
11.92
KB
-rw-rw-rw-
verify_ensurepip_wheels.py
3.21
KB
-rw-rw-rw-
which.py
1.71
KB
-rw-rw-rw-
win_add2path.py
1.68
KB
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : get-remote-certificate.py
#!/usr/bin/env python3 # # fetch the certificate that the server(s) are providing in PEM form # # args are HOST:PORT [, HOST:PORT...] # # By Bill Janssen. import re import os import sys import tempfile def fetch_server_certificate (host, port): def subproc(cmd): from subprocess import Popen, PIPE, STDOUT proc = Popen(cmd, stdout=PIPE, stderr=STDOUT, shell=True) status = proc.wait() output = proc.stdout.read() return status, output def strip_to_x509_cert(certfile_contents, outfile=None): m = re.search(br"^([-]+BEGIN CERTIFICATE[-]+[\r]*\n" br".*[\r]*^[-]+END CERTIFICATE[-]+)$", certfile_contents, re.MULTILINE | re.DOTALL) if not m: return None else: tn = tempfile.mktemp() with open(tn, "wb") as fp: fp.write(m.group(1) + b"\n") try: tn2 = (outfile or tempfile.mktemp()) status, output = subproc(r'openssl x509 -in "%s" -out "%s"' % (tn, tn2)) if status != 0: raise RuntimeError('OpenSSL x509 failed with status %s and ' 'output: %r' % (status, output)) with open(tn2, 'rb') as fp: data = fp.read() os.unlink(tn2) return data finally: os.unlink(tn) if sys.platform.startswith("win"): tfile = tempfile.mktemp() with open(tfile, "w") as fp: fp.write("quit\n") try: status, output = subproc( 'openssl s_client -connect "%s:%s" -showcerts < "%s"' % (host, port, tfile)) finally: os.unlink(tfile) else: status, output = subproc( 'openssl s_client -connect "%s:%s" -showcerts < /dev/null' % (host, port)) if status != 0: raise RuntimeError('OpenSSL connect failed with status %s and ' 'output: %r' % (status, output)) certtext = strip_to_x509_cert(output) if not certtext: raise ValueError("Invalid response received from server at %s:%s" % (host, port)) return certtext if __name__ == "__main__": if len(sys.argv) < 2: sys.stderr.write( "Usage: %s HOSTNAME:PORTNUMBER [, HOSTNAME:PORTNUMBER...]\n" % sys.argv[0]) sys.exit(1) for arg in sys.argv[1:]: host, port = arg.split(":") sys.stdout.buffer.write(fetch_server_certificate(host, int(port))) sys.exit(0)
Close