Linux premium180.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
LiteSpeed
: 162.0.209.168 | : 216.73.216.187
Cant Read [ /etc/named.conf ]
8.3.30
nortrmdp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
opt /
alt /
ruby18 /
share /
ri /
1.8 /
system /
Shellwords /
[ HOME SHELL ]
Name
Size
Permission
Action
cdesc-Shellwords.yaml
1.12
KB
-rw-r--r--
escape-i.yaml
234
B
-rw-r--r--
join-i.yaml
230
B
-rw-r--r--
shellescape-i.yaml
839
B
-rw-r--r--
shelljoin-i.yaml
726
B
-rw-r--r--
shellsplit-i.yaml
829
B
-rw-r--r--
shellwords-i.yaml
242
B
-rw-r--r--
split-i.yaml
232
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : shellescape-i.yaml
--- !ruby/object:RI::MethodDescription aliases: - !ruby/object:RI::AliasName name: escape block_params: comment: - !ruby/struct:SM::Flow::P body: Escapes a string so that it can be safely used in a Bourne shell command line. - !ruby/struct:SM::Flow::P body: Note that a resulted string should be used unquoted and is not intended for use in double quotes nor in single quotes. - !ruby/struct:SM::Flow::VERB body: " open("| grep #{Shellwords.escape(pattern)} file") { |pipe|\n # ...\n }\n" - !ruby/struct:SM::Flow::P body: +String#shellescape+ is a shorthand for this function. - !ruby/struct:SM::Flow::VERB body: " open("| grep #{pattern.shellescape} file") { |pipe|\n # ...\n }\n" full_name: Shellwords#shellescape is_singleton: false name: shellescape params: (str) visibility: public
Close