Linux biogene 3.16.0-11-amd64 #1 SMP Debian 3.16.84-1 (2020-06-09) x86_64
Apache
: 46.101.124.208 | : 3.147.44.192
Cant Read [ /etc/named.conf ]
5.6.40-0+deb8u12
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
python2.7 /
dist-packages /
bcrypt /
[ HOME SHELL ]
Name
Size
Permission
Action
__init__.py
2.1
KB
-rw-r--r--
__init__.pyc
2.44
KB
-rw-r--r--
_bcrypt.so
27.25
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : __init__.py
"""OpenBSD Blowfish password hashing. This module implements the OpenBSD Blowfish password hashing algorithm, as described in "A Future-Adaptable Password Scheme" by Niels Provos and David Mazieres. This system hashes passwords using a version of Bruce Schneier's Blowfish block cipher with modifications designed to raise the cost of off-line password cracking. The computation cost of the algorithm is parametised, so it can be increased as computers get faster. Passwords are hashed using the hashpw() routine: hashpw(password, salt) -> hashed_password Salts for the the second parameter may be randomly generated using the gensalt() function: gensalt(log_rounds = 12) -> random_salt The parameter "log_rounds" defines the complexity of the hashing. The cost increases as 2**log_rounds. Passwords can be checked against a hashed copy using the checkpw() routine: checkpw(password, hashed_password) -> boolean (true if matched) Passwords and salts for the hashpw and gensalt functions are text strings that must not contain embedded nul (ASCII 0) characters. This module also operates as a key derivation function (KDF) to transform a password and salt into bytes suitable for use as cryptographic key material: kdf(password, salt, desired_length, rounds) -> key This will generate a key of "desired_length" in bytes (NB. not bits). For the KDF mode the "rounds" parameter is the literal rounds, not the logarithm as for gensalt. For the KDF case, "salt" and "password" may be binary strings containing embedded nul characters. Note also that the "salt" for the KDF should just be a random sequence of bytes (e.g. as generated by os.urandom) and not one prepared with gensalt(). The KDF mode is recommended for generating symmetric cipher keys, IVs, hash and MAC keys, etc. It should not be used a keystream for encryption itself. """ import os from bcrypt._bcrypt import * def gensalt(log_rounds = 12): """Generate a random text salt for use with hashpw(). "log_rounds" defines the complexity of the hashing, increasing the cost as 2**log_rounds.""" return encode_salt(os.urandom(16), min(max(log_rounds, 4), 31))
Close