403Webshell
Server IP : 51.89.169.208  /  Your IP : 216.73.216.94
Web Server : Apache
System : Linux ns3209505.ip-198-244-202.eu 4.18.0-553.27.1.el8_10.x86_64 #1 SMP Tue Nov 5 04:50:16 EST 2024 x86_64
User : yellowleaf ( 1019)
PHP Version : 7.4.33
Disable Function : exec,passthru,shell_exec,system
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /proc/thread-self/root/proc/thread-self/root/usr/share/zsh/5.5.1/functions/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/thread-self/root/proc/thread-self/root/usr/share/zsh/5.5.1/functions/tcp_proxy
# Listen on the given port and for every connection, start a new 
# command (defaults to $SHELL) in the background on the accepted fd.
# WARNING: this can leave your host open to the universe.  For use
# in a restricted fashion on a secure network.
#
# Remote logins are much more efficient...

local TCP_LISTEN_FD
trap '[[ -n $TCP_LISTEN_FD ]] && ztcp -c $TCP_LISTEN_FD; return 1' \
    HUP INT TERM EXIT PIPE

if [[ $1 != <-> ]]; then
    print "Usage: $0 port [cmd args... ]" >&2
    return 1
fi

integer port=$1
shift
ztcp -l $port || return 1
TCP_LISTEN_FD=$REPLY

(( $# )) || set -- ${SHELL:-zsh}
local cmd=$1
shift

while ztcp -a $TCP_LISTEN_FD; do
    # hack to expand aliases without screwing up arguments
    eval $cmd '$*  <&$REPLY >&$REPLY 2>&$REPLY &'
    # Close the session fd; we don't need it here any more.
    ztcp -c $REPLY
done

Youez - 2016 - github.com/yon3zu
LinuXploit