SILENT KILLERPanel

Current Path: > > lib > python3.6 > site-packages >


Operation   : Linux premium131.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
Software     : Apache
Server IP    : 162.0.232.56 | Your IP: 216.73.216.111
Domains      : 1034 Domain(s)
Permission   : [ 0755 ]

Files and Folders in: //lib/python3.6/site-packages/

NameTypeSizeLast ModifiedActions
OpenSSL Directory - -
PySocks-1.6.8-py3.6.egg-info Directory - -
__pycache__ Directory - -
chardet Directory - -
chardet-3.0.4-py3.6.egg-info Directory - -
dateutil Directory - -
decorator-4.2.1-py3.6.egg-info Directory - -
dnf Directory - -
dnf-plugins Directory - -
dnfpluginscore Directory - -
dns Directory - -
dnspython-1.15.0-py3.6.egg-info Directory - -
firewall Directory - -
html2text Directory - -
html2text-2019.9.26-py3.6.egg-info Directory - -
idna Directory - -
idna-2.5-py3.6.egg-info Directory - -
iotop Directory - -
isc Directory - -
nftables Directory - -
pip Directory - -
pip-9.0.3.dist-info Directory - -
pkg_resources Directory - -
ply Directory - -
ply-3.9-py3.6.egg-info Directory - -
procfs Directory - -
pyOpenSSL-19.0.0-py3.6.egg-info Directory - -
pycparser Directory - -
pycparser-2.14-py3.6.egg-info Directory - -
pyparsing-2.1.10.dist-info Directory - -
python_dateutil-2.6.1-py3.6.egg-info Directory - -
python_linux_procfs-0.7.3-py3.6.egg-info Directory - -
pyudev Directory - -
pyudev-0.21.0-py3.6.egg-info Directory - -
requests Directory - -
requests-2.20.0-py3.6.egg-info Directory - -
rhn Directory - -
setuptools Directory - -
setuptools-39.2.0.dist-info Directory - -
six-1.11.0.dist-info Directory - -
slip Directory - -
syspurpose Directory - -
syspurpose-1.28.44-py3.6.egg-info Directory - -
tuned Directory - -
up2date_client Directory - -
urllib3 Directory - -
urllib3-1.24.2-py3.6.egg-info Directory - -
decorator.py File 16568 bytes January 14 2018 10:00:21.
easy_install.py File 126 bytes July 15 2025 09:13:40.
hwdata.py File 8142 bytes February 12 2018 08:49:28.
iotop-0.6-py3.6.egg-info File 348 bytes April 06 2024 14:56:52.
isc-2.0-py3.6.egg-info File 267 bytes February 20 2025 09:55:57.
nftables-0.1-py3.6.egg-info File 623 bytes January 28 2025 01:24:56.
pciutils-2.3.6-py3.6.egg-info File 242 bytes November 19 2019 06:36:19.
pyparsing.py File 229867 bytes November 13 2019 10:36:46.
rhnlib-2.8.6-py3.6.egg-info File 343 bytes September 17 2024 10:10:55.
six.py File 30888 bytes November 13 2019 14:45:19.
slip-0.6.4-py3.6.egg-info File 196 bytes October 08 2022 13:05:12.
slip.dbus-0.6.4-py3.6.egg-info File 269 bytes October 08 2022 13:05:12.
socks.py File 32281 bytes December 21 2017 04:05:00.
sockshandler.py File 2913 bytes December 21 2017 04:05:00.

Reading File: //lib/python3.6/site-packages//sockshandler.py

#!/usr/bin/env python
"""
SocksiPy + urllib2 handler

version: 0.3
author: e<e@tr0ll.in>

This module provides a Handler which you can use with urllib2 to allow it to tunnel your connection through a socks.sockssocket socket, with out monkey patching the original socket...
"""
import ssl

try:
    import urllib2
    import httplib
except ImportError: # Python 3
    import urllib.request as urllib2
    import http.client as httplib

import socks # $ pip install PySocks

def merge_dict(a, b):
    d = a.copy()
    d.update(b)
    return d

class SocksiPyConnection(httplib.HTTPConnection):
    def __init__(self, proxytype, proxyaddr, proxyport=None, rdns=True, username=None, password=None, *args, **kwargs):
        self.proxyargs = (proxytype, proxyaddr, proxyport, rdns, username, password)
        httplib.HTTPConnection.__init__(self, *args, **kwargs)

    def connect(self):
        self.sock = socks.socksocket()
        self.sock.setproxy(*self.proxyargs)
        if type(self.timeout) in (int, float):
            self.sock.settimeout(self.timeout)
        self.sock.connect((self.host, self.port))

class SocksiPyConnectionS(httplib.HTTPSConnection):
    def __init__(self, proxytype, proxyaddr, proxyport=None, rdns=True, username=None, password=None, *args, **kwargs):
        self.proxyargs = (proxytype, proxyaddr, proxyport, rdns, username, password)
        httplib.HTTPSConnection.__init__(self, *args, **kwargs)

    def connect(self):
        sock = socks.socksocket()
        sock.setproxy(*self.proxyargs)
        if type(self.timeout) in (int, float):
            sock.settimeout(self.timeout)
        sock.connect((self.host, self.port))
        self.sock = ssl.wrap_socket(sock, self.key_file, self.cert_file)

class SocksiPyHandler(urllib2.HTTPHandler, urllib2.HTTPSHandler):
    def __init__(self, *args, **kwargs):
        self.args = args
        self.kw = kwargs
        urllib2.HTTPHandler.__init__(self)

    def http_open(self, req):
        def build(host, port=None, timeout=0, **kwargs):
            kw = merge_dict(self.kw, kwargs)
            conn = SocksiPyConnection(*self.args, host=host, port=port, timeout=timeout, **kw)
            return conn
        return self.do_open(build, req)

    def https_open(self, req):
        def build(host, port=None, timeout=0, **kwargs):
            kw = merge_dict(self.kw, kwargs)
            conn = SocksiPyConnectionS(*self.args, host=host, port=port, timeout=timeout, **kw)
            return conn
        return self.do_open(build, req)

if __name__ == "__main__":
    import sys
    try:
        port = int(sys.argv[1])
    except (ValueError, IndexError):
        port = 9050
    opener = urllib2.build_opener(SocksiPyHandler(socks.PROXY_TYPE_SOCKS5, "localhost", port))
    print("HTTP: " + opener.open("http://httpbin.org/ip").read().decode())
    print("HTTPS: " + opener.open("https://httpbin.org/ip").read().decode())

SILENT KILLER Tool