Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.145.107.223
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
socat-1.7.3.2 /
[ HOME SHELL ]
Name
Size
Permission
Action
BUGREPORTS
746
B
-rw-r--r--
CHANGES
53.13
KB
-rw-r--r--
COPYING
17.67
KB
-rw-r--r--
COPYING.OpenSSL
6.13
KB
-rw-r--r--
DEVELOPMENT
8.29
KB
-rw-r--r--
EXAMPLES
16.47
KB
-rw-r--r--
FAQ
3.83
KB
-rw-r--r--
PORTING
3.02
KB
-rw-r--r--
README
11.37
KB
-rw-r--r--
SECURITY
1.81
KB
-rw-r--r--
daemon.sh
903
B
-rwxr-xr-x
ftp.sh
4.12
KB
-rwxr-xr-x
gatherinfo.sh
4.03
KB
-rwxr-xr-x
mail.sh
2.02
KB
-rwxr-xr-x
proxy.sh
1.98
KB
-rwxr-xr-x
proxyecho.sh
1.19
KB
-rwxr-xr-x
readline-test.sh
1.25
KB
-rwxr-xr-x
readline.sh
689
B
-rwxr-xr-x
socat_buildscript_for_android....
3.5
KB
-rwxr-xr-x
socks4a-echo.sh
2.51
KB
-rwxr-xr-x
socks4echo.sh
2.3
KB
-rwxr-xr-x
test.sh
390.77
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : proxy.sh
#! /bin/bash # source: proxy.sh # Copyright Gerhard Rieger and contributors (see file CHANGES) # Published under the GNU General Public License V.2, see file COPYING # perform primitive simulation of a proxy server. # accepts and answers correct HTTP CONNECT requests on stdio, and tries to # establish the connection to the given server. # it is required for socats test.sh # for TCP, use this script as: # socat tcp-l:8080,reuseaddr,fork exec:"proxy.sh",nofork # 20130622 GR allow hostnames, not only IP addresses if [ -z "$SOCAT" ]; then if type socat >/dev/null 2>&1; then SOCAT=socat else SOCAT="./socat" fi fi if [ $(echo "x\c") = "x" ]; then E="" elif [ $(echo -e "x\c") = "x" ]; then E="-e" else echo "cannot suppress trailing newline on echo" >&2 exit 1 fi ECHO="echo $E" CR=$($ECHO "\r") #echo "CR=$($ECHO "$CR\c" |od -c)" >&2 case `uname` in HP-UX|OSF1) # their cats are too stupid to work with unix domain sockets CAT="$SOCAT -u stdin stdout" ;; *) CAT=cat ;; esac SPACES=" " while [ -n "$1" ]; do case "$1" in -w) n="$2"; while [ "$n" -gt 0 ]; do SPACES="$SPACES "; n=$((n-1)); done shift ;; #-s) STAT="$2"; shift ;; esac shift done badrequest () { $ECHO "HTTP/1.0${SPACES}500 Bad Request$CR" $ECHO "$CR" } # read and parse HTTP request read m a h #echo "\"$m\" \"$a\" \"$h\"" >&2 if [ "$m" != 'CONNECT' ]; then badrequest; exit 1 fi if [[ "$a" == [0-9]+\.[0-9]+\.[0-9]+\.[0-9]+:[0-9]+ ]]; then : go on below elif [[ "$a" == [0-9a-zA-Z-.][0-9a-zA-Z-.]*:[0-9][0-9]* ]]; then : go on below else badrequest; exit 1 fi if [[ "$h" == HTTP/1.[01][[:space:]]* ]]; then : go on below else badrequest; exit 1 fi # read more headers until empty line while [ "$l" != "$CR" ]; do read l done # send status $ECHO "HTTP/1.0${SPACES}200 OK$CR" # send empty line $ECHO "$CR" # perform proxy (relay) function $SOCAT $SOCAT_OPTS - tcp:$a || { $ECHO "HTTP/1.0${SPACES}500 Failed to connect to $a$CR" $ECHO $CR }
Close