Welcome To Our Shell

Mister Spy & Souheyl Bypass Shell

Current Path : /home/ift/52_procpy/dataninja/websocket/

Linux ift1.ift-informatik.de 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64
Upload File :
Current File : //home/ift/52_procpy/dataninja/websocket/web_so_client.py

#!/usr/bin/env python

import asyncio
import websockets
import json

with open("web_so_cfg.json", 'r') as load_f:
    load_dict = json.load(load_f)

ipaddr = load_dict['server_url']
port = load_dict['server_port']
data_file = load_dict['data_file']
print("ipaddr=", ipaddr)
print("port=", port)
print("data_file=", data_file)

connect_addr_port = 'ws://' + ipaddr + ':' + port
print("connect_addr_port=", connect_addr_port)


async def web_so_op():
#def web_so_op():
    async with websockets.connect(connect_addr_port) as websocket:
        #ws=websockets.connect(connect_addr_port)
        name = input("Enter the cmd--->> ")
        await websocket.send(name)
        #ws.send(name)
        print("> {}".format(name))

        greeting = await websocket.recv()
        #greeting = ws.recv()
        print("< {}".format(greeting))


while True:
    asyncio.get_event_loop().run_until_complete(web_so_op())

bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped)
Email: contact@elmoujehidin.net bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped) Email: contact@elmoujehidin.net