Dre4m Shell
Server IP : 85.214.239.14  /  Your IP : 3.147.77.119
Web Server : Apache/2.4.62 (Debian)
System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64
User : www-data ( 33)
PHP Version : 7.4.18
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
MySQL : OFF  |  cURL : OFF  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : OFF
Directory :  /proc/2/cwd/proc/2/root/proc/2/root/proc/3/cwd/usr/share/doc/libmime-tools-perl/examples/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /proc/2/cwd/proc/2/root/proc/2/root/proc/3/cwd/usr/share/doc/libmime-tools-perl/examples/mimesender
#!/usr/bin/perl

=head1 NAME

mimesender - an example of integrating MIME-tools with Mail::Send.

=head1 SYNOPSIS

Usage:

    mimesender YOU@YOUR.HOST

=head1 DESCRIPTION

This just fakes up a little message and sends it by using Mail::Send
and the 'sendmail' handler.

=head1 AUTHOR

Eryq, eryq@zeegee.com. 

=cut

use Mail::Send;
use MIME::Entity 4.113;
use File::Spec;

### Args?
my ($to) = @ARGV;
$to or die "Usage: mimesender toaddr\n";

### Create MIME entity, with attachment, sent to us:
my $ent = MIME::Entity->build(From    => "secret\@admirer.net",
			      To      => $to,
			      Subject => 'Hello there!', 
			      Data    => "Saluations...");
$ent->attach(Type => 'text/plain',
	     Data => "...and Felicitations!");


### Send it:
$sender = new Mail::Send;
foreach ($ent->head->tags) {       # give the sender our headers
    $sender->set($_, map {chomp $_; $_} $ent->head->get($_));
}
$fh = $sender->open('sendmail');
$ent->print_body($fh);
$fh->close; 

Anon7 - 2022
AnonSec Team