Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.142.98.111
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
pyserial-2.6 /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
enhancedserial.py
2.12
KB
-rw-r--r--
port_publisher.py
17.05
KB
-rw-r--r--
port_publisher.sh
1.03
KB
-rw-r--r--
rfc2217_server.py
6.53
KB
-rw-r--r--
scan.py
762
B
-rw-r--r--
scanlinux.py
481
B
-rw-r--r--
scanwin32.py
7.9
KB
-rw-r--r--
setup-miniterm-py2exe.py
609
B
-rw-r--r--
setup-rfc2217_server-py2exe.py
518
B
-rw-r--r--
setup-wxTerminal-py2exe.py
917
B
-rw-r--r--
tcp_serial_redirect.py
10.28
KB
-rw-r--r--
wxSerialConfigDialog.py
11.5
KB
-rw-r--r--
wxSerialConfigDialog.wxg
13.22
KB
-rw-r--r--
wxTerminal.py
13.21
KB
-rw-r--r--
wxTerminal.wxg
5.51
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : port_publisher.sh
#! /bin/sh # daemon starter script # based on skeleton from Debian GNU/Linux # cliechti at gmx.net PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin DAEMON=/usr/local/bin/port_publisher.py NAME=port_publisher DESC="serial port avahi device publisher" test -f $DAEMON || exit 0 set -e case "$1" in start) echo -n "Starting $DESC: " $DAEMON --daemon --pidfile /var/run/$NAME.pid echo "$NAME." ;; stop) echo -n "Stopping $DESC: " start-stop-daemon --stop --quiet --pidfile /var/run/$NAME.pid # \ --exec $DAEMON echo "$NAME." ;; restart|force-reload) echo -n "Restarting $DESC: " start-stop-daemon --stop --quiet --pidfile \ /var/run/$NAME.pid # --exec $DAEMON sleep 1 $DAEMON --daemon --pidfile /var/run/$NAME.pid echo "$NAME." ;; *) N=/etc/init.d/$NAME echo "Usage: $N {start|stop|restart|force-reload}" >&2 exit 1 ;; esac exit 0
Close