[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.133.117.95: ~ $
import time

from peewee import CharField, IntegerField, CompositeKey

from defence360agent.contracts.config import IContactMessageType
from defence360agent.model import Model, instance
from defence360agent.utils.common import DAY, WEEK

THROTTLING_PERIOD = {
    IContactMessageType.MALWARE_FOUND: DAY,
    IContactMessageType.SCAN_NOT_SCHEDULED: WEEK,
}


class IContactThrottle(Model):
    class Meta:
        database = instance.db
        db_table = "icontact_throttle"
        primary_key = CompositeKey("message_type", "user")

    message_type = CharField()
    user = CharField(null=True)
    #: The last time we sent a notification about :attr:`message_type`
    timestamp = IntegerField(default=0)

    @classmethod
    def may_be_notified(cls, message_type, period_limit, user=None):
        obj, _ = cls.get_or_create(message_type=message_type, user=user)
        return (time.time() - obj.timestamp) > period_limit

    @classmethod
    def refresh(cls, message_type, user=None):
        cls.update(timestamp=time.time()).where(
            cls.message_type == message_type,
            cls.user.is_null(True) if user is None else cls.user == user,
        ).execute()

Filemanager

Name Type Size Permission Actions
__pycache__ Folder 0755
__init__.py File 963 B 0644
event_hook.py File 1.74 KB 0644
icontact.py File 1.16 KB 0644
infected_domain.py File 4.24 KB 0644
instance.py File 481 B 0644
messages_to_send.py File 1.37 KB 0644
simplification.py File 5.05 KB 0644
tls_check.py File 1.29 KB 0644