Linux business72.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
LiteSpeed
: 162.0.229.97 | : 3.23.102.70
Cant Read [ /etc/named.conf ]
8.1.30
temmmp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
opt /
alt /
tests /
alt-php81-pecl-raphf_2.0.1-1.el8 /
tests /
[ HOME SHELL ]
Name
Size
Permission
Action
http001.phpt
1.51
KB
-rw-r--r--
http002.phpt
1.32
KB
-rw-r--r--
http003.phpt
1.38
KB
-rw-r--r--
http004.phpt
2.07
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : http002.phpt
--TEST-- pecl/http-v2 - clean with name and id --SKIPIF-- <?php if (!extension_loaded("http")) { die("skip pecl/http needed"); } if (!class_exists("http\\Client", false)) { die("skip pecl/http-v2 with curl support needed"); } ?> --FILE-- <?php echo "Test\n"; $c = new http\Client("curl", "PHP"); do { $c->enqueue(new http\Client\Request("GET", "http://php.net")); } while (count($c) < 3); unset($c); $h = (array) raphf\stat_persistent_handles(); var_dump(array_intersect_key($h, array_flip(preg_grep("/^http/", array_keys($h))))); raphf\clean_persistent_handles("http\\Client\\Curl"); raphf\clean_persistent_handles("http\\Client\\Curl\\Request", "PHP:php.net:80"); $h = (array) raphf\stat_persistent_handles(); var_dump(array_intersect_key($h, array_flip(preg_grep("/^http/", array_keys($h))))); ?> Done --EXPECTF-- Test array(2) { ["http\Client\Curl"]=> array(1) { ["PHP"]=> array(2) { ["used"]=> int(0) ["free"]=> int(1) } } ["http\Client\Curl\Request"]=> array(1) { ["PHP:php.net:80"]=> array(2) { ["used"]=> int(0) ["free"]=> int(3) } } } array(2) { ["http\Client\Curl"]=> array(0) { } ["http\Client\Curl\Request"]=> array(1) { ["PHP:php.net:80"]=> array(2) { ["used"]=> int(0) ["free"]=> int(0) } } } Done
Close