Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.149.235.171
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib64 /
perl5 /
vendor_perl /
Filter /
[ HOME SHELL ]
Name
Size
Permission
Action
Util
[ DIR ]
drwxr-xr-x
cpp.pm
2.13
KB
-rw-r--r--
decrypt.pm
3
KB
-rw-r--r--
exec.pm
1.21
KB
-rw-r--r--
sh.pm
1.44
KB
-rw-r--r--
tee.pm
862
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : exec.pm
package Filter::exec ; use Carp ; use Filter::Util::Exec ; use strict ; use warnings ; use vars qw($VERSION) ; $VERSION = "1.43" ; sub import { my($self, @args) = @_ ; croak("Usage: use Filter::exec 'command'") unless @args ; Filter::Util::Exec::filter_add($self, @args) ; } 1 ; __END__ =head1 NAME Filter::exec - exec source filter =head1 SYNOPSIS use Filter::exec qw(command parameters) ; =head1 DESCRIPTION This filter pipes the current source file through the program which corresponds to the C<command> parameter. As with all source filters its scope is limited to the current source file only. Every file you want to be processed by the filter must have a use Filter::exec qw(command ) ; near the top. Here is an example script which uses the filter: use Filter::exec qw(tr XYZ PQR) ; $a = 1 ; print "XYZ a = $a\n" ; And here is what it will output: PQR = 1 =head1 WARNING You should be I<very> careful when using this filter. Because of the way the filter is implemented it is possible to end up with deadlock. Be especially careful when stacking multiple instances of the filter in a single source file. =head1 AUTHOR Paul Marquess =head1 DATE 11th December 1995. =cut
Close