shell bypass 403

GrazzMean-Shell Shell

: /lib64/python2.7/Tools/scripts/ [ drwxr-xr-x ]
Uname: Linux business55.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.1.31 [ PHP INFO ] PHP os: Linux
Server Ip: 162.213.251.212
Your Ip: 13.59.182.74
User: allssztx (535) | Group: allssztx (533)
Safe Mode: OFF
Disable Function:
NONE

name : hotshotmain.pyc
�
�fc@s�dZddlZddlZddlZddlZddlZdZd�Zd�Ze	dkr�ej
eejd��ndS(s�
Run a Python script under hotshot's control.

Adapted from a posting on python-dev by Walter D�rwald

usage %prog [ %prog args ] filename [ filename args ]

Any arguments after the filename are used as sys.argv for the filename.
i����Nshotshot.profcCs�tj|�}tjjdtjj|��|g|t_|jd|�|j	�tj
j|�}|jdd�tj
}tjt_
|j�|t_
dS(Nisexecfile(%r)ttimetcalls(thotshottProfiletsystpathtinserttostdirnametargvtruntclosetstatstloadt
sort_statststdouttstderrtprint_stats(tfilenametprofiletargstprofRtsave_stdout((s1/usr/lib64/python2.7/Tools/scripts/hotshotmain.pytrun_hotshots
	
	cCs�tjt�}|j�|jdddddtdddd	�|j|�\}}t|�d
kry|jd�dS|d
}t	||j
|d�S(
Ns-ps	--profiletactiontstoretdefaulttdestRthelpsSpecify profile file to useismissing script to executei(toptparsetOptionParsert__doc__tdisable_interspersed_argst
add_optiontPROFILEt
parse_argstlent
print_helpRR(RtparsertoptionsR((s1/usr/lib64/python2.7/Tools/scripts/hotshotmain.pytmain(s



t__main__i(RRRRRt
hotshot.statsR"RR(t__name__texitR	(((s1/usr/lib64/python2.7/Tools/scripts/hotshotmain.pyt<module>s		
© 2025 GrazzMean-Shell