Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.190.160.6
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
perl-IO-Compress-2.061 /
io /
gzip /
[ HOME SHELL ]
Name
Size
Permission
Action
gzappend
399
B
-rw-r--r--
gzcat
498
B
-rw-r--r--
gzgrep
796
B
-rw-r--r--
gzstream
515
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : gzgrep
#!/usr/bin/perl use strict ; use warnings ; use IO::Uncompress::Gunzip qw($GunzipError); die "Usage: gzgrep pattern [file...]\n" unless @ARGV >= 1; my $pattern = shift ; my $file ; @ARGV = '-' unless @ARGV ; foreach $file (@ARGV) { my $gz = new IO::Uncompress::Gunzip $file or die "Cannot uncompress $file: $GunzipError\n" ; while (<$gz>) { print if /$pattern/ ; } die "Error reading from $file: $GunzipError\n" if $GunzipError ; } __END__ foreach $file (@ARGV) { my $gz = gzopen($file, "rb") or die "Cannot open $file: $gzerrno\n" ; while ($gz->gzreadline($_) > 0) { print if /$pattern/ ; } die "Error reading from $file: $gzerrno\n" if $gzerrno != Z_STREAM_END ; $gz->gzclose() ; }
Close