shell bypass 403

GrazzMean-Shell Shell

Uname: Linux business55.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.1.31 [ PHP INFO ] PHP os: Linux
Server Ip: 162.213.251.212
Your Ip: 3.145.48.89
User: allssztx (535) | Group: allssztx (533)
Safe Mode: OFF
Disable Function:
NONE

name : fix_exec.pyo
�
{fc@s_dZddlmZddlmZddlmZmZmZdejfd��YZ	dS(s�Fixer for exec.

This converts usages of the exec statement into calls to a built-in
exec() function.

exec code in ns1, ns2 -> exec(code, ns1, ns2)
i(tpytree(t
fixer_base(tCommatNametCalltFixExeccBseZeZdZd�ZRS(sx
    exec_stmt< 'exec' a=any 'in' b=any [',' c=any] >
    |
    exec_stmt< 'exec' (not atom<'(' [any] ')'>) a=any >
    cCs�|j}|d}|jd�}|jd�}|j�g}d|d_|dk	rx|jt�|j�g�n|dk	r�|jt�|j�g�nttd�|d|j�S(Ntatbtctiuexectprefix(	tsymstgettcloneR
tNonetextendRRR(tselftnodetresultsRRRRtargs((s./usr/lib64/python2.7/lib2to3/fixes/fix_exec.pyt	transforms	

(t__name__t
__module__tTruet
BM_compatibletPATTERNR(((s./usr/lib64/python2.7/lib2to3/fixes/fix_exec.pyRsN(
t__doc__R	RRt
fixer_utilRRRtBaseFixR(((s./usr/lib64/python2.7/lib2to3/fixes/fix_exec.pyt<module>
s
© 2025 GrazzMean-Shell