代码搜索:Scripts
找到约 7,993 项符合「Scripts」的源代码
代码结果 7,993
www.eeworm.com/read/136030/5875718
cgi mpstate.cgi
#!/bin/sh
LOCALIP=`cat /etc/sysconfig/network-scripts/ifcfg-eth0|sed -n 's/IPADDR=\(.*\)/\1/p'`
WEBPORT=80
echo "Status: 200 Ok"
echo "Content-type:text/html"
echo ""
echo "
www.eeworm.com/read/136030/5875730
cgi chmpcfg.cgi
#!/bin/sh
modify_ip()
{
_IP=$1
#echo "Modify the host ip as : $_IP"
_ETHCFG=`cat /etc/sysconfig/network-scripts/ifcfg-eth0`
_OUTPUT=`echo "$_ETHCFG"|sed "s/IPADDR=\(.*\)/IPADDR=$_IP/g"`
ec
www.eeworm.com/read/135153/5887071
makefile
TARGET_TYPE = OBJECT_LIBRARY
TARGET = rmcpputils.o
SRC = \
rmbufferstream.cpp \
rmfilestream.cpp \
rmobject.cpp
include ../../scripts/inc.Makefile
www.eeworm.com/read/135153/5887078
makefile
TARGET_TYPE := OBJECT_LIBRARY
TARGET := rmavicorelibrary.o
SRC := \
rmavistream.cpp \
rmavicore.cpp
include ../../scripts/inc.Makefile
www.eeworm.com/read/131315/5935951
nih
eval "exec /usr/bin/perl -Spi.bak $0 $*"
if $running_under_some_shell;
# $Header: nih,v 4.0 91/03/20 01:11:29 lwall Locked $
# This script makes #! scripts directly executable on machines that don'
www.eeworm.com/read/125811/6021511
makefile
TARGET_TYPE = OBJECT_LIBRARY
TARGET = rmsampling.o
SRC = rmresampler.c
include ../../scripts/inc.Makefile
www.eeworm.com/read/485831/6547817
js xdr.js
function AJax(SpanId,SubmitUrl){
var xmlHttp;
try{
xmlHttp=new XMLHttpRequest();
}
catch (e){
try{
xmlHttp=new ActiveXObject("Msxml2.XMLHTTP");
}
catch (e){
try{
xmlHttp=new
www.eeworm.com/read/485837/6548183
js xdr.js
function AJax(SpanId,SubmitUrl){
var xmlHttp;
try{
xmlHttp=new XMLHttpRequest();
}
catch (e){
try{
xmlHttp=new ActiveXObject("Msxml2.XMLHTTP");
}
catch (e){
try{
xmlHttp=new
www.eeworm.com/read/485343/6559535
readme
sql scripts in this directory are required for all other demos. This has the
following scripts:
i) bz_main.sql - This scripts calls other scripts to create objects in the
schema bz. It also creat
www.eeworm.com/read/480906/6653021
h unicode.h
//标准端口扫描中的默认端口
char *ports[10]={"21","80","53","25","79","23","110","1433","5631","3389"};
//unicode漏洞修改web文件的文件名
char * modify[5]={
"\\index.htm\r\n",
"\\index.asp\r\n",