Linux cpanel.rrshost.in 5.15.0-25-generic #25-Ubuntu SMP Wed Mar 30 15:54:22 UTC 2022 x86_64
Apache
: 109.123.238.221 | : 172.69.130.136
128 Domain
8.2.28
aev999
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
gawk /
examples /
network /
[ HOME SHELL ]
Name
Size
Permission
Action
PostAgent.sh
274
B
-rw-r--r--
coreserv.awk
3.31
KB
-rw-r--r--
eliza.awk
9.98
KB
-rw-r--r--
fingerclient.awk
161
B
-rw-r--r--
geturl.awk
787
B
-rw-r--r--
hello-serv.awk
463
B
-rw-r--r--
maze.awk
2.59
KB
-rw-r--r--
mobag.awk
2.77
KB
-rw-r--r--
panic.awk
575
B
-rw-r--r--
protbase.awk
400
B
-rw-r--r--
protbase.request
162
B
-rw-r--r--
protbase.result
642
B
-rw-r--r--
remconf.awk
2.13
KB
-rw-r--r--
statist.awk
3.53
KB
-rw-r--r--
stoxdata.txt
165
B
-rw-r--r--
stoxpred.awk
5.5
KB
-rw-r--r--
testserv.awk
334
B
-rw-r--r--
urlchk.awk
1.03
KB
-rw-r--r--
webgrab.awk
187
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : protbase.awk
{ request = request "\n" $0 } END { BLASTService = "/inet/tcp/0/www.ncbi.nlm.nih.gov/80" printf "POST /cgi-bin/BLAST/nph-blast_report HTTP/1.0\n" |& BLASTService printf "Content-Length: " length(request) "\n\n" |& BLASTService printf request |& BLASTService while ((BLASTService |& getline) > 0) print $0 close(BLASTService) }
Close