Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.3
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib64 /
python3.6 /
site-packages /
setools /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
diff
[ DIR ]
drwxr-xr-x
__init__.py
2.79
KB
-rw-r--r--
boolquery.py
2.19
KB
-rw-r--r--
boundsquery.py
2.35
KB
-rw-r--r--
categoryquery.py
1.88
KB
-rw-r--r--
commonquery.py
2.11
KB
-rw-r--r--
constraintquery.py
5.5
KB
-rw-r--r--
defaultquery.py
2.8
KB
-rw-r--r--
descriptors.py
7.47
KB
-rw-r--r--
devicetreeconquery.py
2.72
KB
-rw-r--r--
dta.py
21.4
KB
-rw-r--r--
exception.py
5.97
KB
-rw-r--r--
fsusequery.py
3.36
KB
-rw-r--r--
genfsconquery.py
3.68
KB
-rw-r--r--
ibendportconquery.py
3.52
KB
-rw-r--r--
ibpkeyconquery.py
5.22
KB
-rw-r--r--
infoflow.py
14.59
KB
-rw-r--r--
initsidquery.py
2.79
KB
-rw-r--r--
iomemconquery.py
4.44
KB
-rw-r--r--
ioportconquery.py
4.46
KB
-rw-r--r--
mixins.py
7.14
KB
-rw-r--r--
mlsrulequery.py
4.59
KB
-rw-r--r--
netifconquery.py
2.93
KB
-rw-r--r--
nodeconquery.py
4.16
KB
-rw-r--r--
objclassquery.py
3.78
KB
-rw-r--r--
pcideviceconquery.py
3.04
KB
-rw-r--r--
perm_map
87.16
KB
-rw-r--r--
permmap.py
16.1
KB
-rw-r--r--
pirqconquery.py
2.95
KB
-rw-r--r--
polcapquery.py
1.64
KB
-rw-r--r--
policyrep.cpython-36m-x86_64-l...
1.87
MB
-rwxr-xr-x
portconquery.py
5.04
KB
-rw-r--r--
query.py
1.69
KB
-rw-r--r--
rbacrulequery.py
5.61
KB
-rw-r--r--
rolequery.py
2.48
KB
-rw-r--r--
sensitivityquery.py
2.65
KB
-rw-r--r--
terulequery.py
9.11
KB
-rw-r--r--
typeattrquery.py
2.62
KB
-rw-r--r--
typequery.py
3.43
KB
-rw-r--r--
userquery.py
4.68
KB
-rw-r--r--
util.py
5.32
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : objclassquery.py
# Copyright 2014-2015, Tresys Technology, LLC # # This file is part of SETools. # # SETools is free software: you can redistribute it and/or modify # it under the terms of the GNU Lesser General Public License as # published by the Free Software Foundation, either version 2.1 of # the License, or (at your option) any later version. # # SETools is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with SETools. If not, see # <http://www.gnu.org/licenses/>. # import logging import re from contextlib import suppress from .descriptors import CriteriaDescriptor, CriteriaSetDescriptor from .exception import NoCommon from .mixins import MatchName from .query import PolicyQuery from .util import match_regex, match_regex_or_set class ObjClassQuery(MatchName, PolicyQuery): """ Query object classes. Parameter: policy The policy to query. Keyword Parameters/Class attributes: name The name of the object set to match. name_regex If true, regular expression matching will be used for matching the name. common The name of the inherited common to match. common_regex If true, regular expression matching will be used for matching the common name. perms The permissions to match. perms_equal If true, only commons with permission sets that are equal to the criteria will match. Otherwise, any intersection will match. perms_regex If true, regular expression matching will be used on the permission names instead of set logic. comparison will not be used. perms_indirect If false, permissions inherited from a common permission set not will be evaluated. Default is true. """ common = CriteriaDescriptor("common_regex", "lookup_common") common_regex = False perms = CriteriaSetDescriptor("perms_regex") perms_equal = False perms_indirect = True perms_regex = False def __init__(self, policy, **kwargs): super(ObjClassQuery, self).__init__(policy, **kwargs) self.log = logging.getLogger(__name__) def results(self): """Generator which yields all matching object classes.""" self.log.info("Generating object class results from {0.policy}".format(self)) self._match_name_debug(self.log) self.log.debug("Common: {0.common!r}, regex: {0.common_regex}".format(self)) self.log.debug("Perms: {0.perms}, regex: {0.perms_regex}, " "eq: {0.perms_equal}, indirect: {0.perms_indirect}".format(self)) for class_ in self.policy.classes(): if not self._match_name(class_): continue if self.common: try: if not match_regex( class_.common, self.common, self.common_regex): continue except NoCommon: continue if self.perms: perms = class_.perms if self.perms_indirect: with suppress(NoCommon): perms |= class_.common.perms if not match_regex_or_set( perms, self.perms, self.perms_equal, self.perms_regex): continue yield class_
Close