Linux iad1-shared-b7-18 6.6.49-grsec-jammy+ #10 SMP Thu Sep 12 23:23:08 UTC 2024 x86_64
Apache
: 67.205.6.31 | : 216.73.216.13
Cant Read [ /etc/named.conf ]
8.2.29
fernandoquevedo
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
zsh /
functions /
TCP /
[ HOME SHELL ]
Name
Size
Permission
Action
tcp_alias
4
KB
-rw-r--r--
tcp_close
2.91
KB
-rw-r--r--
tcp_command
68
B
-rw-r--r--
tcp_expect
4.98
KB
-rw-r--r--
tcp_fd_handler
970
B
-rw-r--r--
tcp_log
2.23
KB
-rw-r--r--
tcp_open
6.63
KB
-rw-r--r--
tcp_output
1.81
KB
-rw-r--r--
tcp_point
443
B
-rw-r--r--
tcp_proxy
849
B
-rw-r--r--
tcp_read
6.89
KB
-rw-r--r--
tcp_rename
850
B
-rw-r--r--
tcp_send
1.94
KB
-rw-r--r--
tcp_sess
1.01
KB
-rw-r--r--
tcp_shoot
324
B
-rw-r--r--
tcp_spam
2.84
KB
-rw-r--r--
tcp_talk
1.44
KB
-rw-r--r--
tcp_wait
459
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : tcp_output
emulate -L zsh setopt extendedglob local opt tprompt sess read_fd tpat quiet cursess while getopts "F:P:qS:" opt; do case $opt in (F) read_fd=$OPTARG ;; (P) tprompt=$OPTARG ;; (q) quiet=1 ;; (S) sess=$OPTARG ;; (*) [[ $opt != \? ]] && print -r "Can't handle option $opt" >&2 return 1 ;; esac done (( OPTIND > 1 )) && shift $(( OPTIND - 1 )) # Per-session logs don't have the session discriminator in front. if [[ -n $TCP_LOG_SESS ]]; then print -r -- "$*" >>${TCP_LOG_SESS}.$sess fi # Always add the TCP prompt. We used only to do this with # multiple sessions, but it seems always to be useful to know # where data is coming from; also, it allows more predictable # behaviour in tcp_expect. if [[ -n $tprompt ]]; then if [[ $sess = $TCP_SESS ]]; then cursess="c:1" else cursess="c:0" fi zformat -f REPLY $tprompt "s:$sess" "f:$read_fd" $cursess if [[ $REPLY = %P* ]]; then REPLY=${(%)${REPLY##%P}} fi # We will pass this back up. REPLY="$REPLY$*" else REPLY="$*" fi if [[ -n $TCP_LOG ]]; then print -r -- $REPLY >>${TCP_LOG} fi if [[ -z $quiet ]]; then local skip= if [[ ${#tcp_filter} -ne 0 ]]; then # Allow tcp_filter to be an associative array, though # it doesn't *need* to be. for tpat in ${(v)tcp_filter}; do [[ $REPLY = ${~tpat} ]] && skip=1 && break done fi if [[ -z $skip ]]; then # Check flag passed down probably from tcp_fd_handler: # if we have output, we are in zle and need to fix the display first. # (The shell is supposed to be smart enough that you can replace # all the following with # [[ -o zle ]] && zle -I # but I haven't dared try it yet.) if [[ -n $TCP_INVALIDATE_ZLE ]]; then zle -I # Only do this the first time. unset TCP_INVALIDATE_ZLE fi print -r -- $REPLY fi fi
Close