shell bypass 403
�
f�G � � � d dl mZ d dlZd dlZd dlZd dlZd dlZd dlZd dlm Z ddl
mZmZm
Z
ddlmZ ddlmZmZmZmZmZmZ ej. e� Zdj5 � Z ej8 d � Zd
Zd� ZeZ G d� d
e!� Z"y)� )�BytesION)�ZipInfo� )� sysconfig�detect_encoding�ZipFile)�finder)�FileOperator�get_export_entry�convert_path�get_executable�get_platform�in_venva�
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0"
processorArchitecture="X86"
name="%s"
type="win32"/>
<!-- Identify the application security requirements. -->
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>s ^#!.*pythonw?[0-9.]*([ ].*)?$z�# -*- coding: utf-8 -*-
import re
import sys
from %(module)s import %(import_name)s
if __name__ == '__main__':
sys.argv[0] = re.sub(r'(-script\.pyw|\.exe)?$', '', sys.argv[0])
sys.exit(%(func)s())
c �� � d| v r[| j d� r4| j dd� \ }}d|v r|j d� s|�d|�d�} | S | j d� sd| z } | S )N� z
/usr/bin/env r �"z "z"%s")�
startswith�split)�
executable�env�_executables �F/usr/local/python-3.12/lib/python3.12/site-packages/distlib/scripts.py�enquote_executabler 5 sx � �
�j��
� � ��1�)�/�/��Q�7��C���k�!�+�*@�*@��*E�*-�{�;�
� �� �(�(��-�#�j�0�
��� c �N � e Zd ZdZeZdZ dd�Zd� Ze j j d� rd� Zd� Z
d� Zdd �Zd
� ZeZd� Zd� Zd
Zd� Zdd�Zd� Zed� � Zej6 d� � Zej: dk( sej: dk( rej<