shell bypass 403

GrazzMean-Shell Shell

: /lib64/python2.7/Tools/scripts/ [ drwxr-xr-x ]
Uname: Linux business55.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.1.31 [ PHP INFO ] PHP os: Linux
Server Ip: 162.213.251.212
Your Ip: 3.21.104.171
User: allssztx (535) | Group: allssztx (533)
Safe Mode: OFF
Disable Function:
NONE

name : gprof2html.pyo
�
�fc@szdZddlZddlZddlZddlZddlZdZdZd�Zd�Z	e
dkrve	�ndS(s+Transform gprof(1) output into useful HTML.i����NsF<html>
<head>
  <title>gprof output (%s)</title>
</head>
<body>
<pre>
s</pre>
</body>
</html>
ccs#x|D]}tj|�VqWdS(N(tcgitescape(tinputtline((s0/usr/lib64/python2.7/Tools/scripts/gprof2html.pytadd_escapess
cCs�d}tjdr#tjd}n|d}tt|��}t|d�}|jt|�x.|D]&}|j|�|jd�rfPqfqfWi}xv|D]n}tjd|�}|s�|j|�Pn|j	dd�\}}|||<|jd||||f�q�Wx.|D]&}|j|�|jd	�rPqqWx�|D]�}tjd
|�}|s�|j|�|jd�rGPqGqGn|j	ddd�\}	}}
||kr�|j|�qGn|jd
�r�|jd|	||||
f�qG|jd|	|||
f�qGWxW|D]O}xFtj
d|�D]2}||kr`d||f}n|j|�q;Wq"W|jt�|j�t
jdtjj|��dS(Ns	gprof.outis.htmltws times
(.*  )(\w+)\nis+%s<a name="flat:%s" href="#call:%s">%s</a>
sindex % times*(.*  )(\w+)(( &lt;cycle.*&gt;)? \[\d+\])\nsIndex by function nameit[s-%s<a name="call:%s" href="#flat:%s">%s</a>%s
s%s<a href="#call:%s">%s</a>%s
s(\w+(?:\.c)?|\W+)s<a href="#call:%s">%s</a>sfile:(tsystargvRtfiletwritetheadert
startswithtretmatchtgrouptfindallttrailertcloset
webbrowsertopentostpathtabspath(tfilenametoutputfilenameRtoutputRtlabelstmtstufftfnametprefixtsuffixtpart((s0/usr/lib64/python2.7/Tools/scripts/gprof2html.pytmainsb






	




		


t__main__(t__doc__R
RRRRRRRR"t__name__(((s0/usr/lib64/python2.7/Tools/scripts/gprof2html.pyt<module>s<			4
© 2025 GrazzMean-Shell