Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 18.219.247.59
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
perl-IPC-Run-0.92 /
abuse /
[ HOME SHELL ]
Name
Size
Permission
Action
blocking_debug_with_sub_coproc...
823
B
-rw-r--r--
blocking_writes
1005
B
-rw-r--r--
broken_pipe_on_bad_executable_...
305
B
-rw-r--r--
timers
207
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : blocking_writes
#!/usr/bin/perl ## Submitted by Borislav Deianov <borislav@users.sourceforge.net> ## This stresses the blocking write to see if it blocks. use Fcntl; use IO::Pty; use IPC::Run qw(run); sub makecmd { return ['perl', '-e', '<STDIN>, print "\n" x '.$_[0].'; while(<STDIN>){last if /end/}']; } pipe R, W; fcntl(W, F_SETFL, O_NONBLOCK); while (syswrite(W, "\n", 1)) { $pipebuf++ }; print "pipe buffer size is $pipebuf\n"; $in = "\n" x ($pipebuf * 3) . "end\n"; print "reading from scalar via pipe... "; run(makecmd($pipebuf * 3), '<', \$in, '>', \$out); print "done\n"; print "reading from code via pipe... "; run(makecmd($pipebuf * 3), '<', sub { $t = $in; undef $in; $t}, '>', \$out); print "done\n"; $pty = IO::Pty->new(); $pty->blocking(0); $slave = $pty->slave(); while ($pty->syswrite("\n", 1)) { $ptybuf++ }; print "pty buffer size is $ptybuf\n"; $in = "\n" x ($ptybuf * 3) . "end\n"; print "reading via pty... "; run(makecmd($ptybuf * 3), '<pty<', \$in, '>', \$out); print "done\n";
Close