Lines Matching refs:executable

12 # text if readable, executable if runnable binary, data if unreadable.
27 16 lelong 0xef000011 RISC OS AIF executable
122 >18 lelong &02 executable,
319 0 short 0420 0420 Alliant virtual executable
322 0 short 0421 0421 Alliant compact executable
346 0 belong 0x000003f3 AmigaOS loadseg()ble executable/binary
1888 # aout: file(1) magic for a.out executable/object/etc entries that
1902 0 lelong 0407 a.out little-endian 32-bit executable
1906 0 lelong 0410 a.out little-endian 32-bit pure executable
1910 0 lelong 0413 a.out little-endian 32-bit demand paged pure executable
1922 0 belong 0407 a.out big-endian 32-bit executable
1925 0 belong 0410 a.out big-endian 32-bit pure executable
1928 0 belong 0413 a.out big-endian 32-bit demand paged executable
2241 # Note there might be some problems with the "VAX COFF executable"
2329 0 belong 0xfade0cc0 Mac OS X Detached Code Signature (non-executable)
3274 # BatComp left out: sig looks like COM executable
3970 5 string -pc1- PopCom compressed executable (CP/M)
4521 #0 beshort 0550 3b20 COFF executable
4524 #0 beshort 0551 3b20 COFF executable (TV)
4532 >18 beshort &00000020 executable
4542 0 beshort 0561 WE32000 COFF executable (TV)
5819 0 string bFLT BFLT executable
6251 #0 long 0407 68K Blit (standalone) executable
6252 #0 short 0407 VAX-order2 68K Blit (standalone) executable
6253 0 short 03401 VAX-order 68K Blit (standalone) executable
6254 0 long 0406 68k Blit mpx/mux executable
6255 0 short 0406 VAX-order2 68k Blit mpx/mux executable
6256 0 short 03001 VAX-order 68k Blit mpx/mux executable
6259 #0 short 0520 tty630 layers executable
6285 # Some object/executable formats use the same magic numbers as are used
6289 0 lelong 0314 386 compact demand paged pure executable
6297 >>20 belong =4096 dynamically linked executable
6298 >>20 belong >4096 dynamically linked executable
6299 >0 byte ^0x80 executable
6304 >0 byte &0x80 dynamically linked executable
6305 >0 byte ^0x80 executable
6310 >0 byte &0x80 dynamically linked executable
6311 >0 byte ^0x80 executable
7117 0 short 0575 CLIPPER COFF executable (VAX #)
7125 0 short 0577 CLIPPER COFF executable
7157 0 string/w #!\ /usr/bin/clj Clojure script text executable
7159 0 string/w #!\ /usr/local/bin/clj Clojure script text executable
7161 0 string/w #!\ /usr/bin/clojure Clojure script text executable
7163 0 string/w #!\ /usr/local/bin/clojure Clojure script text executable
7165 0 string/W #!/usr/bin/env\ clj Clojure script text executable
7167 0 string/W #!/usr/bin/env\ clojure Clojure script text executable
7169 0 string/W #!\ /usr/bin/env\ clj Clojure script text executable
7171 0 string/W #!\ /usr/bin/env\ clojure Clojure script text executable
7206 # DJGPP, 80386 COFF executable, MS Windows COFF Intel 80386 object file (./intel)
7212 # executable (RISC System/6000 V3.1) or obj module (./ibm6000)
7229 >>>>18 leshort &0x0002 executable
7280 0 string/wt #!\ /bin/sh POSIX shell script text executable
7282 0 string/wb #!\ /bin/sh POSIX shell script executable (binary data)
7285 0 string/wt #!\ /bin/csh C shell script text executable
7289 0 string/wt #!\ /bin/ksh Korn shell script text executable
7291 0 string/wb #!\ /bin/ksh Korn shell script executable (binary data)
7294 0 string/wt #!\ /bin/tcsh Tenex C shell script text executable
7296 0 string/wt #!\ /usr/bin/tcsh Tenex C shell script text executable
7298 0 string/wt #!\ /usr/local/tcsh Tenex C shell script text executable
7300 0 string/wt #!\ /usr/local/bin/tcsh Tenex C shell script text executable
7305 0 string/wt #!\ /bin/zsh Paul Falstad's zsh script text executable
7307 0 string/wt #!\ /usr/bin/zsh Paul Falstad's zsh script text executable
7309 0 string/wt #!\ /usr/local/bin/zsh Paul Falstad's zsh script text executable
7311 0 search/1 #!/usr/bin/env\ zsh Paul Falstad's zsh script text executable
7314 0 string/wt #!\ /usr/local/bin/ash Neil Brown's ash script text executable
7316 0 string/wt #!\ /usr/local/bin/ae Neil Brown's ae script text executable
7318 0 string/wt #!\ /bin/nawk new awk script text executable
7320 0 string/wt #!\ /usr/bin/nawk new awk script text executable
7322 0 string/wt #!\ /usr/local/bin/nawk new awk script text executable
7324 0 string/wt #!\ /bin/gawk GNU awk script text executable
7326 0 string/wt #!\ /usr/bin/gawk GNU awk script text executable
7328 0 string/wt #!\ /usr/local/bin/gawk GNU awk script text executable
7331 0 string/wt #!\ /bin/awk awk script text executable
7333 0 string/wt #!\ /usr/bin/awk awk script text executable
7338 0 string/wt #!\ /bin/rc Plan 9 rc shell script text executable
7341 0 string/wt #!\ /bin/bash Bourne-Again shell script text executable
7343 0 string/wb #!\ /bin/bash Bourne-Again shell script executable (binary data)
7345 0 string/wt #!\ /usr/bin/bash Bourne-Again shell script text executable
7347 0 string/wb #!\ /usr/bin/bash Bourne-Again shell script executable (binary data)
7349 0 string/wt #!\ /usr/local/bash Bourne-Again shell script text executable
7351 0 string/wb #!\ /usr/local/bash Bourne-Again shell script executable (binary data)
7353 0 string/wt #!\ /usr/local/bin/bash Bourne-Again shell script text executable
7355 0 string/wb #!\ /usr/local/bin/bash Bourne-Again shell script executable (binary data)
7357 0 string/wt #!\ /usr/bin/env\ bash Bourne-Again shell script text executable
7362 0 string/wt #!\ /usr/local/bin/fish fish shell script text executable
7364 0 string/wt #!\ /usr/bin/fish fish shell script text executable
7366 0 string/wt #!\ /usr/bin/env\ fish fish shell script text executable
7370 0 search/1/wt #!\ /usr/bin/tclsh Tcl/Tk script text executable
7373 0 search/1/wt #!\ /usr/bin/texlua LuaTex script text executable
7376 0 search/1/wt #!\ /usr/bin/luatex LuaTex script text executable
7379 0 search/1/wt #!\ /usr/bin/stap Systemtap script text executable
7393 0 search/1/w #!\ /usr/local/bin/php PHP script text executable
7396 0 search/1/w #!\ /usr/bin/php PHP script text executable
8338 0 string PS-X\ EXE Sony Playstation executable
8355 0 string CPE CPE executable
8360 0 string XBEH Microsoft Xbox executable
8361 !:mime audio/x-xbox-executable
8419 0 string XEX2 Microsoft Xbox 360 executable
8420 !:mime audio/x-xbox360-executable
8426 0 string XEX1 Microsoft Xbox 360 executable (XEX1)
8427 !:mime audio/x-xbox360-executable
8918 0x00 string NSO0 Nintendo Switch executable (NSO)
9000 0 belong 0513 Convex old-style demand paged executable
9002 0 belong 0515 Convex old-style pre-paged executable
9004 0 belong 0517 Convex old-style pre-paged, non-swapped executable
9036 >84 belong &0x80000000 executable
10233 >>22 leshort&030000 !020000 executable
10640 >16 leshort 2 executable,
10641 !:mime application/x-executable
10642 >16 leshort 3 ${x?pie executable:shared object},
10644 !:mime application/x-${x?pie-executable:sharedlib}
10649 >>16 leshort 0xFE01 executable,
10650 !:mime application/x-executable
10962 >20 short 0x107 executable
10963 >20 short 0x108 pure executable
10964 >20 short 0x10b demand-paged executable
10965 >20 short 0x10f unsupported executable
10970 0 short 0x155 Encore unsupported executable
11036 0 lelong 0x1000007A Psion Series 5 executable
14301 # schemes for distinguishing between executable images, shared libraries,
14315 # an executable, and is dynamically-linked if the "has run-time
14323 # a dynamically-linked executable;
14330 # if the entry point is non-zero, it's an executable, otherwise
14336 # a dynamically-linked executable, otherwise it's just an
14337 # executable.
14347 # it's a dynamically-linked executable);
14350 # set, then it's just an executable.
14373 >>3 byte&0x80 0x80 dynamically linked executable
14374 >>3 byte&0x80 0x00 executable
14383 >>3 byte&0x80 0x80 dynamically linked executable
14384 >>3 byte&0x80 0x00 executable
14393 >>3 byte&0x80 0x80 dynamically linked executable
14394 >>3 byte&0x80 0x00 executable
14403 >>3 byte&0x80 0x80 dynamically linked executable
14404 >>3 byte&0x80 0x00 executable
15060 >40 byte 1 executable
15265 # mo extension is also used for Easeus Partition Master PE32 executable module
15870 0 beshort 0627 Apollo m68k COFF executable
15873 0 beshort 0624 apollo a88k COFF executable
15882 0 belong 0x02100107 PA-RISC1.1 executable
15887 0 belong 0x02100108 PA-RISC1.1 shared executable
15892 0 belong 0x0210010b PA-RISC1.1 demand-load executable
15906 0 belong 0x02140107 PA-RISC2.0 executable
15911 0 belong 0x02140108 PA-RISC2.0 shared executable
15916 0 belong 0x0214010b PA-RISC2.0 demand-load executable
15930 0 belong 0x020b0107 PA-RISC1.0 executable
15935 0 belong 0x020b0108 PA-RISC1.0 shared executable
15940 0 belong 0x020b010b PA-RISC1.0 demand-load executable
15952 0 long 0x02080106 HP s500 relocatable executable
15955 0 long 0x02080107 HP s500 executable
15958 0 long 0x02080108 HP s500 pure executable
15962 0 belong 0x020c0108 HP s200 pure executable
15969 0 belong 0x020c0107 HP s200 executable
15976 0 belong 0x020c010b HP s200 demand-load executable
15983 0 belong 0x020c0106 HP s200 relocatable executable
15990 0 belong 0x020a0108 HP s200 (2.x release) pure executable
15994 0 belong 0x020a0107 HP s200 (2.x release) executable
16274 #>0 string HU X executable
16279 #0 beshort 0x601a Human68k Z executable
16286 #>4 string LZX R executable
16287 #2 string #HUPAIR Human68k hupair R executable
16293 # "ibm370" said that 0x15d == 0535 was "ibm 370 pure executable".
16297 # 0 short 0535 370 sysV executable
16301 # 0 short 0530 370 sysV pure executable
16308 0 beshort 0537 370 XA sysV executable
16312 0 beshort 0532 370 XA sysV pure executable
16316 0 beshort 054001 370 sysV pure executable
16318 0 beshort 055001 370 XA sysV pure executable
16320 0 beshort 056401 370 sysV executable
16322 0 beshort 057401 370 XA sysV executable
16324 0 beshort 0531 SVR2 executable (Amdahl-UTS)
16327 0 beshort 0534 SVR2 pure executable (Amdahl-UTS)
16330 0 beshort 0530 SVR2 pure executable (USS/370)
16333 0 beshort 0535 SVR2 executable (USS/370)
16345 0 beshort 0x01df executable (RISC System/6000 V3.1) or obj module
16348 #0 beshort 0x0103 executable (RT Version 2) or obj module
16362 0 beshort 0x01f7 64-bit XCOFF executable or object module
16663 >>24 string Exec with executable chunk
19450 # Various flavors of x86 UNIX executable/object (other than Xenix, which
19461 0 leshort 0502 basic-16 executable
19464 0 leshort 0503 basic-16 executable (TV)
19467 0 leshort 0510 x86 executable
19469 0 leshort 0511 x86 executable (TV)
19471 0 leshort =0512 iAPX 286 executable small model (COFF)
19474 0 leshort =0522 iAPX 286 executable large model (COFF)
19481 # ./intel (version 5.25) label labeled the next entry as "80386 COFF executable"
19482 # SGI labeled the next entry as "iAPX 386 executable" --Dan Quinlan
19718 0 search/1/w #!/bin/node Node.js script text executable
19720 0 search/1/w #!/usr/bin/node Node.js script text executable
19722 0 search/1/w #!/bin/nodejs Node.js script text executable
19724 0 search/1/w #!/usr/bin/nodejs Node.js script text executable
19726 0 search/1 #!/usr/bin/env\ node Node.js script text executable
19728 0 search/1 #!/usr/bin/env\ nodejs Node.js script text executable
20217 # >0 leshort 0407 impure executable (OMAGIC)
20218 # >0 leshort 0410 pure executable (NMAGIC)
20219 # >0 leshort 0413 demand-paged executable (ZMAGIC)
20220 # >0 leshort 0314 demand-paged executable (QMAGIC)
20222 0 lelong 0x00640107 Linux/i386 impure executable (OMAGIC)
20224 0 lelong 0x00640108 Linux/i386 pure executable (NMAGIC)
20226 0 lelong 0x0064010b Linux/i386 demand-paged executable (ZMAGIC)
20228 0 lelong 0x006400cc Linux/i386 demand-paged executable (QMAGIC)
20234 0 string \01\03\020\04 Linux-8086 impure executable
20236 0 string \01\03\040\04 Linux-8086 executable
20241 0 string \01\03\020\20 Minix-386 impure executable
20243 0 string \01\03\040\20 Minix-386 executable
20245 0 string \01\03\04\20 Minix-386 NSYM/GNU executable
20254 # this can be overridden by the DOS executable (COM) entry
20355 >510 leshort 0xAA55 x86 boot executable
20447 0x24 lelong 0x016f2818 Linux kernel ARM boot executable zImage
20456 0x24 belong 0x016f2818 Linux kernel ARM boot executable zImage (big-endian)
20460 0x38 lelong 0x644d5241 Linux kernel ARM64 boot executable Image
20468 # Linux 8086 executable
20469 0 lelong&0xFF0000FF 0xC30000E9 Linux-Dev86 executable, headerless
20473 0 lelong&0xFF00FFFF 0x4000301 Linux-8086 executable
20487 # 0 lelong&0xFF00FFFF 0x10000301 ld86 I80386 executable
20488 # 0 lelong&0xFF00FFFF 0xB000301 ld86 M68K executable
20489 # 0 lelong&0xFF00FFFF 0xC000301 ld86 NS16K executable
20490 # 0 lelong&0xFF00FFFF 0x17000301 ld86 SPARC executable
20863 0 search/1/w #!\ /usr/bin/lua Lua script text executable
20865 0 search/1/w #!\ /usr/local/bin/lua Lua script text executable
20867 0 search/1 #!/usr/bin/env\ lua Lua script text executable
20869 0 search/1 #!\ /usr/bin/env\ lua Lua script text executable
21151 >12 belong 2 executable
21157 >12 belong 5 preload executable
22642 0 beshort 0x0160 MIPSEB ECOFF executable
22651 0 beshort 0x0162 MIPSEL-BE ECOFF executable
22660 0 beshort 0x6001 MIPSEB-LE ECOFF executable
22669 0 beshort 0x6201 MIPSEL ECOFF executable
22680 0 beshort 0x0163 MIPSEB MIPS-II ECOFF executable
22689 0 beshort 0x0166 MIPSEL-BE MIPS-II ECOFF executable
22698 0 beshort 0x6301 MIPSEB-LE MIPS-II ECOFF executable
22707 0 beshort 0x6601 MIPSEL MIPS-II ECOFF executable
22718 0 beshort 0x0140 MIPSEB MIPS-III ECOFF executable
22727 0 beshort 0x0142 MIPSEL-BE MIPS-III ECOFF executable
22736 0 beshort 0x4001 MIPSEB-LE MIPS-III ECOFF executable
22745 0 beshort 0x4201 MIPSEL MIPS-III ECOFF executable
22763 0 long 31415 Mirage Assembler m.out executable
22958 >18 beshort &00000020 executable
22965 0 beshort 0521 mc68k executable (shared)
22967 0 beshort 0522 mc68k executable (shared demand paged)
22972 0 beshort 0554 68K BCS executable
22978 0 beshort 0555 88K BCS executable
22990 0 belong&0xFFFFFFF0 0x601A0000 Atari ST M68K contiguous executable
22995 0 belong&0xFFFFFFF0 0x601B0000 Atari ST M68K non-contig executable
23002 0 beshort 0x601A Atari 68xxx executable,
23090 # ./intel already labeled COFF type 0x14c=0514 as "80386 COFF executable"
23110 >0x18 leshort <0x40 MS-DOS executable
23125 >>(0x3c.l+24) leshort 0x010b \b32 executable
23126 >>(0x3c.l+24) leshort 0x020b \b32+ executable
23209 # executable inside (which just prints a message and exits if run in win)
23242 >>(0x3c.l) string !PE\0\0 MS-DOS executable
23290 >>(0x3c.l) string LE\0\0 \b, LE executable
23325 # header data too small for extended executable
23336 # calculations (next embedded executable would be at &(&2*512+&0-2)
23357 # By now an executable type should have been printed out. The executable
23454 0 name msdos-driver DOS executable (
23565 >>>4 ubyte >13 DOS executable (COM, 0x8C-variant)
23579 0 ulelong 0xffff10eb DR-DOS executable (COM)
23585 >0 byte x DOS executable (COM)
23622 # syslinux COM32 or COM32R executable
23623 >>1 lelong&0xFFFFFFFe 0x21CD4CFe COM executable (32-bit COMBOOT
23637 # "COM executable (COM32R)" or "Syslinux COM32 module" by TrID
23647 #>>1 default x COM executable for DOS
23649 ##!:mime application/x-ms-dos-executable
23667 >>&2 string UPX! FREE-DOS executable (COM), UPX
23678 252 string Must\ have\ DOS\ version DR-DOS executable (COM)
23682 #2 search/28 \xcd\x21 COM executable for MS-DOS
23684 2 string \xcd\x21 COM executable for DOS
23688 4 string \xcd\x21 COM executable for DOS
23692 5 string \xcd\x21 COM executable for DOS
23697 >0 byte !0xb8 COM executable for DOS
23702 >5 string !\xcd\x21 COM executable for DOS
23706 13 string \xcd\x21 COM executable for DOS
23710 18 string \xcd\x21 COM executable for MS-DOS
23714 23 string \xcd\x21 COM executable for MS-DOS
23718 30 string \xcd\x21 COM executable for MS-DOS
23722 70 string \xcd\x21 COM executable for DOS
23726 0x6 search/0xa \xfc\x57\xf3\xa5\xc3 COM executable for MS-DOS
23729 0x6 search/0xa \xfc\x57\xf3\xa4\xc3 COM executable for DOS
23733 0x3c string W\ Collis\0\0 COM executable for MS-DOS, Compack compressed
23739 0 string/b LZ MS-DOS executable (built-in)
24273 # Note: Message file is used by executable with same main name.
25244 >20 beshort 0407 executable
25245 >20 beshort 0410 pure executable
25249 >20 beshort 0407 executable
25250 >20 beshort 0410 pure executable
25254 >20 beshort 0407 executable
25255 >20 beshort 0410 pure executable
25259 >20 beshort 0407 executable
25260 >20 beshort 0410 pure executable
25264 >20 beshort 0407 executable
25265 >20 beshort 0410 pure executable
25271 >20 beshort 0407 executable
25272 >20 beshort 0413 pure executable
25278 >20 beshort 0407 executable
25279 >20 beshort 0413 pure executable
25317 >>20 lelong =4096 dynamically linked executable
25318 >>20 lelong >4096 dynamically linked executable
25319 >0 byte ^0x80 executable
25325 >>20 lelong =8192 dynamically linked executable
25326 >>20 lelong >8192 dynamically linked executable
25327 >0 byte ^0x80 executable
25332 >0 byte &0x80 dynamically linked executable
25335 >>20 lelong !0 executable
25341 >0 byte &0x80 dynamically linked executable
25342 >0 byte ^0x80 executable
26218 >>16 leshort 2 executable,
26251 >>16 beshort 2 executable,
26553 >6 byte&0x0f 0x00 non-executable
26561 >6 byte&0xf0 0x10 program executable
26592 >0x12 byte 1 program executable
26776 >19 byte&0x02 0x02 executable
26997 # pdp: file(1) magic for PDP-11 executable/object and APL workspace
27004 0 leshort 0407 PDP-11 executable
27017 0 leshort 0410 PDP-11 pure executable
27021 0 leshort 0411 PDP-11 separate I&D executable
27028 0 leshort 0413 PDP-11 demand-paged pure executable
27031 0 leshort 0430 PDP-11 overlaid pure executable
27034 0 leshort 0431 PDP-11 overlaid separate executable
27061 0 string #!/usr/bin/env\ perl Perl script text executable
27063 0 string #!\ /usr/bin/env\ perl Perl script text executable
27066 >0 regex \^#!.*/bin/perl([[:space:]].*)*$ Perl script text executable
28170 0 belong 0x00000107 Plan 9 executable, Motorola 68k
28171 0 belong 0x000001EB Plan 9 executable, Intel 386
28172 0 belong 0x00000247 Plan 9 executable, Intel 960
28173 0 belong 0x000002AB Plan 9 executable, SPARC
28174 0 belong 0x00000407 Plan 9 executable, MIPS R3000
28175 0 belong 0x0000048B Plan 9 executable, AT&T DSP 3210
28176 0 belong 0x00000517 Plan 9 executable, MIPS R4000 BE
28177 0 belong 0x000005AB Plan 9 executable, AMD 29000
28178 0 belong 0x00000647 Plan 9 executable, ARM 7-something
28179 0 belong 0x000006EB Plan 9 executable, PowerPC
28180 0 belong 0x00000797 Plan 9 executable, MIPS R4000 LE
28181 0 belong 0x0000084B Plan 9 executable, DEC Alpha
28491 0 long 0x50900107 Pyramid 90x family executable
28492 0 long 0x50900108 Pyramid 90x family pure executable
28494 0 long 0x5090010b Pyramid 90x family demand paged pure executable
28504 0 string/t """ Python script text executable
28714 0 search/1/w #!\040/usr/bin/python Python script text executable
28717 0 search/1/w #!\040/usr/local/bin/python Python script text executable
28720 0 search/10/w #!\040/usr/bin/env\040python Python script text executable
28727 >0 regex \^from[\040\t]+([A-Za-z0-9_]|\\.)+[\040\t]+import.*$ Python script text executable
28733 >&0 search/64 self Python script text executable
28739 >&0 search/64 '__main__' Python script text executable
28740 >&0 search/64 "__main__" Python script text executable
28746 >0 regex \^import\ [_[:alpha:]]+\ as\ [[:alpha:]][[:space:]]*$ Python script text executable
28751 #>&0 regex .*'''$ Python script text executable
28755 #>&0 regex .*"""$ Python script text executable
28762 >&0 regex \^[[:space:]]*except.*:$ Python script text executable
28765 >&0 search/4096 finally: Python script text executable
28770 >0 regex \^class\ [_[:alpha:]]+(\\(.*\\))?(\ )*:([\ \t]+pass)?$ Python script text executable
28777 >>&0 regex \\(([[:alpha:]*_,\ ]){0,255}\\):$ Python script text executable
29823 0 search/1/w #!\ /usr/bin/ruby Ruby script text executable
29826 0 search/1/w #!\ /usr/local/bin/ruby Ruby script text executable
29829 0 search/1 #!/usr/bin/env\ ruby Ruby script text executable
29832 0 search/1 #!\ /usr/bin/env\ ruby Ruby script text executable
30091 0 lelong 0x10ea BALANCE NS32000 executable (0 @ 0)
30094 0 lelong 0x20ea BALANCE NS32000 executable (invalid @ 0)
30097 0 lelong 0x30ea BALANCE NS32000 standalone executable
30107 0 leshort 0x22eb SYMMETRY i386 executable (0 @ 0)
30110 0 leshort 0x32eb SYMMETRY i386 executable (invalid @ 0)
30115 #0 leshort 0x42eb SYMMETRY i386 standalone executable
30120 >>124 lelong !28867614 SYMMETRY i386 standalone executable
30489 0 string NqNqNq`\004 QL firmware executable (BCPL)
30496 4 belong 0x4AFB QDOS executable
31387 >>20 belong =4096 dynamically linked executable
31388 >>20 belong >4096 dynamically linked executable
31389 >0 byte ^0x80 executable
31393 >0 byte &0x80 dynamically linked executable
31394 >0 byte ^0x80 executable
31398 >0 byte &0x80 dynamically linked executable
31399 >0 byte ^0x80 executable
31405 >>20 belong =4096 dynamically linked executable
31406 >>20 belong >4096 dynamically linked executable
31407 >0 byte ^0x80 executable
31411 >0 byte &0x80 dynamically linked executable
31412 >0 byte ^0x80 executable
31416 >0 byte &0x80 dynamically linked executable
31417 >0 byte ^0x80 executable
31423 >>20 belong =4096 dynamically linked executable
31424 >>20 belong >4096 dynamically linked executable
31425 >0 byte ^0x80 executable
31429 >0 byte &0x80 dynamically linked executable
31430 >0 byte ^0x80 executable
31434 >0 byte &0x80 dynamically linked executable
31435 >0 byte ^0x80 executable
31557 0x30 string SymExe SymbOS executable
31918 0 search/1/w #!\ /usr/bin/tcl Tcl script text executable
31920 0 search/1/w #!\ /usr/local/bin/tcl Tcl script text executable
31922 0 search/1 #!/usr/bin/env\ tcl Tcl script text executable
31924 0 search/1 #!\ /usr/bin/env\ tcl Tcl script text executable
31926 0 search/1/w #!\ /usr/bin/wish Tcl/Tk script text executable
31928 0 search/1/w #!\ /usr/local/bin/wish Tcl/Tk script text executable
31930 0 search/1 #!/usr/bin/env\ wish Tcl/Tk script text executable
31932 0 search/1 #!\ /usr/bin/env\ wish Tcl/Tk script text executable
32604 # (executable, pure, and split I&D, respectively), but the PDP-11 version
32617 #0 short 0x107 unknown machine executable
32620 #0 short 0x108 unknown pure executable
32626 #0 short 0x10b unknown pure executable
32629 0 long 0x10c unknown demand paged pure executable
32631 0 long 0x10e unknown readable demand paged pure executable
32758 0 short 0610 Perkin-Elmer executable
32760 0 beshort 0572 amd 29k coff noprebar executable
32761 0 beshort 01572 amd 29k coff prebar executable
32764 6 beshort 0407 unicos (cray) executable
32770 0 string Joy!peffpwpc header for PowerPC PEF executable
32787 # 0 string exec BugOS executable
32800 >3 string >\0 %s script text executable
32804 >3 string >\0 %s script executable (binary data)
32808 >3 string >\0 %s script text executable
32812 >3 string >\0 %s script executable (binary data)
32816 >2 string >\0 %s script text executable
32820 >2 string >\0 %s script executable (binary data)
32823 0 string/t #!\ script text executable
32827 0 string/b #!\ script executable
32833 >15 string/t >\0 %s script text executable
32837 >15 string/b >\0 %s script executable (binary data)
32841 >16 string/t >\0 %s script text executable
32845 >16 string/b >\0 %s script executable (binary data)
32857 # vax: file(1) magic for VAX executable/object and APL workspace
32866 0 lelong 0420 a.out VAX demand paged (first page unmapped) pure executable
32876 >2 uleshort <100 VAX COFF executable, sections %d
32882 >2 uleshort <100 VAX COFF pure executable, sections %d
33268 0 string \xb0\0\x30\0 VMS VAX executable
33282 >8 ubelong 0xec020000 VMS Alpha executable
33528 # For format usable in DOS, such as generic executable
35046 >0x1e leshort &0x1 executable
35056 >0 byte &0x1 executable
35066 >0x1e leshort &0x1 executable
35137 >6 leshort&0x1000 =0x0000 executable,