Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.141.38.5
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
socat-1.7.3.2 /
[ HOME SHELL ]
Name
Size
Permission
Action
BUGREPORTS
746
B
-rw-r--r--
CHANGES
53.13
KB
-rw-r--r--
COPYING
17.67
KB
-rw-r--r--
COPYING.OpenSSL
6.13
KB
-rw-r--r--
DEVELOPMENT
8.29
KB
-rw-r--r--
EXAMPLES
16.47
KB
-rw-r--r--
FAQ
3.83
KB
-rw-r--r--
PORTING
3.02
KB
-rw-r--r--
README
11.37
KB
-rw-r--r--
SECURITY
1.81
KB
-rw-r--r--
daemon.sh
903
B
-rwxr-xr-x
ftp.sh
4.12
KB
-rwxr-xr-x
gatherinfo.sh
4.03
KB
-rwxr-xr-x
mail.sh
2.02
KB
-rwxr-xr-x
proxy.sh
1.98
KB
-rwxr-xr-x
proxyecho.sh
1.19
KB
-rwxr-xr-x
readline-test.sh
1.25
KB
-rwxr-xr-x
readline.sh
689
B
-rwxr-xr-x
socat_buildscript_for_android....
3.5
KB
-rwxr-xr-x
socks4a-echo.sh
2.51
KB
-rwxr-xr-x
socks4echo.sh
2.3
KB
-rwxr-xr-x
test.sh
390.77
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : socks4echo.sh
#! /bin/bash # source: socks4echo.sh # Copyright Gerhard Rieger and contributors (see file CHANGES) # Published under the GNU General Public License V.2, see file COPYING # perform primitive simulation of a socks4 server with echo function via stdio. # accepts and answers correct SOCKS4 requests, but then just echoes data. # it is required for test.sh # for TCP, use this script as: # socat tcp-l:1080,reuseaddr,crlf system:"socks4echo.sh" # older bash and ksh do not have -n option to read command; we try dd then #if echo a |read -n 1 null >/dev/null 2>&1; then # HAVE_READ_N=1 #else # and newer bash (4.3) has some other problem with read -n HAVE_READ_N= #fi if type socat >/dev/null 2>&1; then SOCAT=socat else SOCAT=./socat fi case `uname` in HP-UX|OSF1) CAT="$SOCAT -u stdin stdout" ;; *) CAT=cat ;; esac if [ $(echo "x\c") = "x" ]; then E="" elif [ $(echo -e "x\c") = "x" ]; then E="-e" else echo "cannot suppress trailing newline on echo" >&2 exit 1 fi ECHO="echo $E" if [ $($ECHO "\0101") = "A" ]; then SOCKSREPLY_FAILED="\0\0133\0\0\0\0\0\0\c" SOCKSREPLY_OK="\0\0132\0\0\0\0\0\0\c" else SOCKSREPLY_FAILED="\0\133\0\0\0\0\0\0\c" SOCKSREPLY_OK="\0\132\0\0\0\0\0\0\c" fi # read and parse SOCKS4 header if [ "$HAVE_READ_N" ]; then read -r -n 1 vn # bash 2.0.3 does not support -n else vn=$(dd bs=1 count=1 2>/dev/null) fi if [ "$vn" != $($ECHO "\04") ]; then $ECHO "$SOCKSREPLY_FAILED" echo "invalid socks version requested" >&2 exit fi if [ "$HAVE_READ_N" ]; then read -r -n 1 cd else cd=$(dd bs=1 count=1 2>/dev/null) fi if [ "$cd" != $($ECHO "\01") ]; then $ECHO "$SOCKSREPLY_FAILED" echo "invalid socks operation requested" >&2 exit fi if [ "$HAVE_READ_N" ]; then read -r -n 6 a else a=$(dd bs=1 count=6 2>/dev/null) fi if [ "$a" != "$($ECHO "}m bL6")" ]; then $ECHO "$SOCKSREPLY_FAILED" echo "$0: wrong socks address or port requested" >&2 echo "$0: expected $($ECHO "}m bL6"|od -t x1), received $($ECHO "$a"|od -t x1)" >&2 exit fi if [ "$HAVE_READ_N" ]; then read -r -n 7 u else u=$(dd bs=1 count=7 2>/dev/null) fi if [ "$u" != "nobody" ]; then $ECHO "$SOCKSREPLY_FAILED" echo "wrong socks user requested" >&2 exit fi # send ok status $ECHO "$SOCKSREPLY_OK" # perform echo function $CAT
Close