代码搜索:bash

找到约 5,321 项符合「bash」的源代码

代码结果 5,321
www.eeworm.com/read/123250/6062012

sh template_generator_mimetype.sh

#!/bin/bash # $Id: template_generator_mimetype.sh,v 2.0 2003/11/18 15:20:45 nijel Exp $ # # Shell script that adds a new mimetype without transform function. # # The filename should contain either 'mi
www.eeworm.com/read/112192/6149677

sh serviceapplicationtest.sh

#!/bin/bash # # $Id: ServiceApplicationTest.sh,v 1.5 2001/11/01 07:03:07 icahoon Exp $ # MACHINE="$(uname).$(uname -m)" if [ -x ./bin.debug.${MACHINE} ] then echo -e "./bin.debug.${MACHINE}/Servi
www.eeworm.com/read/112192/6149751

sh getopttest.sh

#!/bin/bash # MACHINE=$(uname).$(uname -m) if [ -x ./bin.debug.${MACHINE} ] then echo -e " ./bin.debug.${MACHINE}/GetOptTest This is a -a -b -c foo -d bar -0 -1 -2 -x -xa --add 1 --append --close --
www.eeworm.com/read/237496/6305892

sh fwbin2pkg.sh

#!/bin/bash # script to convert a binary fw package (output from gen_fw) # into a .h file for static inclusion # call fwbin2h.sh "comment" input_file output_file if [ $# -ne 3 ]; then echo "#
www.eeworm.com/read/408174/11402831

example dialup.sh.example

#!/bin/bash # # This script is called from VDR to start/stop dialup-network # # argument 1: wanted action, one of start,stop # RUN="/var/tmp/vdr.dialup.run" action="$1" case "$action" in up) up p
www.eeworm.com/read/346656/11733700

cgi shoppe.cgi

#!/usr/bin/perl -wT use strict; use CGI; use CGIBook::Error; use HTML::Template; BEGIN { $ENV{PATH} = "/bin:/usr/bin"; delete @ENV{ qw( IFS CDPATH ENV BASH_ENV ) }; sub unindent; } us
www.eeworm.com/read/340849/12130909

rc upnpd.rc

#!/bin/bash # # /etc/rc.d/init.d/upnpd # # Starts the upnpd daemon # # chkconfig: 345 95 5 # description: Internet Gateway Device # processname: upnpd # Source function library. . /etc/init.d/functio
www.eeworm.com/read/253602/12210506

txt linux kernel binfmt_elf core dump local buffer overflow exploit.txt

#!/bin/bash # # elfcd.sh # warning: This code will crash your machine # cat
www.eeworm.com/read/253602/12210520

txt linux kernel binfmt_elf core dump local buffer overflow exploit.txt

#!/bin/bash # # elfcd.sh # warning: This code will crash your machine # cat
www.eeworm.com/read/339483/12230436

sh rot14.sh

#!/bin/bash # A version of "rot13" using 'eval'. # Compare to "rot13.sh" example. setvar_rot_13() # "rot13" scrambling { local varname=$1 varvalue=$2 eval $varname='$(echo "$varvalue