Windows NT DGPENSV2LPKMN 10.0 build 14393 (Windows Server 2016) AMD64
Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/7.3.25
: 172.16.0.66 | : 172.16.0.254
Cant Read [ /etc/named.conf ]
7.3.25
SYSTEM
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
[ A ]
[ C ]
[ D ]
C: /
xampp7 /
php /
pear /
PHP /
CodeSniffer /
[ HOME SHELL ]
Name
Size
Permission
Action
CommentParser
[ DIR ]
drwxrwxrwx
DocGenerators
[ DIR ]
drwxrwxrwx
Reports
[ DIR ]
drwxrwxrwx
Standards
[ DIR ]
drwxrwxrwx
Tokenizers
[ DIR ]
drwxrwxrwx
.mad-root
0
B
-rw-rw-rw-
CLI.php
26.24
KB
-rw-rw-rw-
Exception.php
1009
B
-rw-rw-rw-
File.php
98.16
KB
-rw-rw-rw-
MultiFileSniff.php
1.4
KB
-rw-rw-rw-
Report.php
1.41
KB
-rw-rw-rw-
Reporting.php
7.53
KB
-rw-rw-rw-
Sniff.php
3
KB
-rw-rw-rw-
Tokens.php
15.16
KB
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Sniff.php
<?php /** * Represents a PHP_CodeSniffer sniff for sniffing coding standards. * * PHP version 5 * * @category PHP * @package PHP_CodeSniffer * @author Greg Sherwood <gsherwood@squiz.net> * @author Marc McIntyre <mmcintyre@squiz.net> * @copyright 2006-2011 Squiz Pty Ltd (ABN 77 084 670 600) * @license http://matrix.squiz.net/developer/tools/php_cs/licence BSD Licence * @link http://pear.php.net/package/PHP_CodeSniffer */ /** * Represents a PHP_CodeSniffer sniff for sniffing coding standards. * * A sniff registers what token types it wishes to listen for, then, when * PHP_CodeSniffer encounters that token, the sniff is invoked and passed * information about where the token was found in the stack, and the * PHP_CodeSniffer file in which the token was found. * * @category PHP * @package PHP_CodeSniffer * @author Greg Sherwood <gsherwood@squiz.net> * @author Marc McIntyre <mmcintyre@squiz.net> * @copyright 2006-2011 Squiz Pty Ltd (ABN 77 084 670 600) * @license http://matrix.squiz.net/developer/tools/php_cs/licence BSD Licence * @version Release: 1.3.3 * @link http://pear.php.net/package/PHP_CodeSniffer */ interface PHP_CodeSniffer_Sniff { /** * Registers the tokens that this sniff wants to listen for. * * An example return value for a sniff that wants to listen for whitespace * and any comments would be: * * <code> * return array( * T_WHITESPACE, * T_DOC_COMMENT, * T_COMMENT, * ); * </code> * * @return array(int) * @see Tokens.php */ public function register(); /** * Called when one of the token types that this sniff is listening for * is found. * * The stackPtr variable indicates where in the stack the token was found. * A sniff can acquire information this token, along with all the other * tokens within the stack by first acquiring the token stack: * * <code> * $tokens = $phpcsFile->getTokens(); * echo 'Encountered a '.$tokens[$stackPtr]['type'].' token'; * echo 'token information: '; * print_r($tokens[$stackPtr]); * </code> * * If the sniff discovers an anomilty in the code, they can raise an error * by calling addError() on the PHP_CodeSniffer_File object, specifying an error * message and the position of the offending token: * * <code> * $phpcsFile->addError('Encountered an error', $stackPtr); * </code> * * @param PHP_CodeSniffer_File $phpcsFile The PHP_CodeSniffer file where the * token was found. * @param int $stackPtr The position in the PHP_CodeSniffer * file's token stack where the token * was found. * * @return void */ public function process(PHP_CodeSniffer_File $phpcsFile, $stackPtr); }//end interface ?>
Close