403Webshell
Server IP : 66.29.132.122  /  Your IP : 3.145.101.81
Web Server : LiteSpeed
System : Linux business142.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User : admazpex ( 531)
PHP Version : 7.2.34
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /proc/self/root/proc/thread-self/root/opt/imunify360/venv/lib/python3.11/site-packages/defence360agent/hooks/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/self/root/proc/thread-self/root/opt/imunify360/venv/lib/python3.11/site-packages/defence360agent/hooks//native.py
import importlib.util
import os
from collections import namedtuple
from typing import Dict


ENTRYPOINT = "im_hook"
ModuleInfo = namedtuple("ModuleInfo", ("object", "mtime", "ctime"))
modules = {}  # type: Dict[str, ModuleInfo]


def import_hook(path):
    file_stat = os.stat(path)
    if (
        path in modules
        and modules[path].mtime == file_stat.st_mtime
        and modules[path].ctime == file_stat.st_ctime
    ):
        return modules[path].object

    spec = importlib.util.spec_from_file_location(path, path)
    hook_module = importlib.util.module_from_spec(spec)
    spec.loader.exec_module(hook_module)
    modules[path] = ModuleInfo(
        object=hook_module, mtime=file_stat.st_mtime, ctime=file_stat.st_ctime
    )
    return hook_module


def remove_hook(path):
    if path in modules:
        modules.pop(path)


def execute_hook(path, dict_param):
    hook_module = import_hook(path)
    entrypoint = getattr(hook_module, ENTRYPOINT)
    return entrypoint(dict_param)

Youez - 2016 - github.com/yon3zu
LinuXploit