Lines Matching refs:executable
12 # text if readable, executable if runnable binary, data if unreadable.
27 16 lelong 0xef000011 RISC OS AIF executable
122 >18 lelong &02 executable,
341 0 short 0420 0420 Alliant virtual executable
344 0 short 0421 0421 Alliant compact executable
368 0 belong 0x000003f3 AmigaOS loadseg()ble executable/binary
1976 # aout: file(1) magic for a.out executable/object/etc entries that
1990 0 lelong 0407 a.out little-endian 32-bit executable
1994 0 lelong 0410 a.out little-endian 32-bit pure executable
1998 0 lelong 0413 a.out little-endian 32-bit demand paged pure executable
2010 0 belong 0407 a.out big-endian 32-bit executable
2013 0 belong 0410 a.out big-endian 32-bit pure executable
2016 0 belong 0413 a.out big-endian 32-bit demand paged executable
2329 # Note there might be some problems with the "VAX COFF executable"
2417 0 belong 0xfade0cc0 Mac OS X Detached Code Signature (non-executable)
3143 # skip VAX-order 68k Blit mpx/mux executable (strength=50) handled by ./blit
3553 # BatComp left out: sig looks like COM executable
4375 5 string -pc1- PopCom compressed executable (CP/M)
5032 #0 beshort 0550 3b20 COFF executable
5035 #0 beshort 0551 3b20 COFF executable (TV)
5043 >18 beshort &00000020 executable
5053 0 beshort 0561 WE32000 COFF executable (TV)
6468 0 string bFLT BFLT executable
6900 #0 long 0407 68K Blit (standalone) executable
6901 #0 short 0407 VAX-order2 68K Blit (standalone) executable
6902 0 short 03401 VAX-order 68K Blit (standalone) executable
6903 0 long 0406 68k Blit mpx/mux executable
6904 0 short 0406 VAX-order2 68k Blit mpx/mux executable
6906 0 short 03001 VAX-order 68k Blit mpx/mux executable
6908 # skip TTComp archive, ASCII, 4K by looking for executable keyword like main
6909 #>0 search/5536 main\0 VAX-order 68k Blit mpx/mux executable
6912 #0 short 0520 tty630 layers executable
6938 # Some object/executable formats use the same magic numbers as are used
6942 0 lelong 0314 386 compact demand paged pure executable
6950 >>20 belong =4096 dynamically linked executable
6951 >>20 belong >4096 dynamically linked executable
6952 >0 byte ^0x80 executable
6957 >0 byte &0x80 dynamically linked executable
6958 >0 byte ^0x80 executable
6963 >0 byte &0x80 dynamically linked executable
6964 >0 byte ^0x80 executable
8040 0 short 0575 CLIPPER COFF executable (VAX #)
8048 0 short 0577 CLIPPER COFF executable
8080 0 string/w #!\ /usr/bin/clj Clojure script text executable
8082 0 string/w #!\ /usr/local/bin/clj Clojure script text executable
8084 0 string/w #!\ /usr/bin/clojure Clojure script text executable
8086 0 string/w #!\ /usr/local/bin/clojure Clojure script text executable
8088 0 string/W #!/usr/bin/env\ clj Clojure script text executable
8090 0 string/W #!/usr/bin/env\ clojure Clojure script text executable
8092 0 string/W #!\ /usr/bin/env\ clj Clojure script text executable
8094 0 string/W #!\ /usr/bin/env\ clojure Clojure script text executable
8129 # DJGPP, 80386 COFF executable, MS Windows COFF Intel 80386 object file (./intel)
8135 # executable (RISC System/6000 V3.1) or obj module (./ibm6000)
8157 >>>>18 leshort &0x0002 executable
8208 0 string/fwt #!\ /bin/sh POSIX shell script text executable
8210 0 string/fwb #!\ /bin/sh POSIX shell script executable (binary data)
8213 0 string/fwt #!\ /bin/csh C shell script text executable
8217 0 string/fwt #!\ /bin/ksh Korn shell script text executable
8219 0 string/fwb #!\ /bin/ksh Korn shell script executable (binary data)
8222 0 string/fwt #!\ /bin/tcsh Tenex C shell script text executable
8224 0 string/fwt #!\ /usr/bin/tcsh Tenex C shell script text executable
8226 0 string/fwt #!\ /usr/local/tcsh Tenex C shell script text executable
8228 0 string/fwt #!\ /usr/local/bin/tcsh Tenex C shell script text executable
8233 0 string/fwt #!\ /bin/zsh Paul Falstad's zsh script text executable
8235 0 string/fwt #!\ /usr/bin/zsh Paul Falstad's zsh script text executable
8237 0 string/fwt #!\ /usr/local/bin/zsh Paul Falstad's zsh script text executable
8239 0 string/fwt #!\ /usr/bin/env\ zsh Paul Falstad's zsh script text executable
8242 0 string/fwt #!\ /bin/ash Neil Brown's ash script text executable
8244 0 string/fwt #!\ /usr/bin/ash Neil Brown's ash script text executable
8246 0 string/fwt #!\ /usr/local/bin/ash Neil Brown's ash script text executable
8248 0 string/fwt #!\ /usr/local/bin/ae Neil Brown's ae script text executable
8250 0 string/fwt #!\ /bin/nawk new awk script text executable
8252 0 string/fwt #!\ /usr/bin/nawk new awk script text executable
8254 0 string/fwt #!\ /usr/local/bin/nawk new awk script text executable
8256 0 string/fwt #!\ /bin/gawk GNU awk script text executable
8258 0 string/wt #!\ /usr/bin/gawk GNU awk script text executable
8260 0 string/fwt #!\ /usr/local/bin/gawk GNU awk script text executable
8263 0 string/fwt #!\ /bin/awk awk script text executable
8265 0 string/fwt #!\ /usr/bin/awk awk script text executable
8270 0 string/fwt #!\ /bin/rc Plan 9 rc shell script text executable
8273 0 string/fwt #!\ /bin/bash Bourne-Again shell script text executable
8275 0 string/fwb #!\ /bin/bash Bourne-Again shell script executable (binary data)
8277 0 string/fwt #!\ /usr/bin/bash Bourne-Again shell script text executable
8279 0 string/fwb #!\ /usr/bin/bash Bourne-Again shell script executable (binary data)
8281 0 string/fwt #!\ /usr/local/bash Bourne-Again shell script text executable
8283 0 string/fwb #!\ /usr/local/bash Bourne-Again shell script executable (binary data)
8285 0 string/fwt #!\ /usr/local/bin/bash Bourne-Again shell script text executable
8287 0 string/fwb #!\ /usr/local/bin/bash Bourne-Again shell script executable (binary data)
8289 0 string/fwt #!\ /usr/bin/env\ bash Bourne-Again shell script text executable
8294 0 string/fwt #!\ /usr/local/bin/fish fish shell script text executable
8296 0 string/fwt #!\ /usr/bin/fish fish shell script text executable
8298 0 string/fwt #!\ /usr/bin/env\ fish fish shell script text executable
8302 >&-1 string/T x %s script text executable
8304 0 search/1/fwt #!\ /usr/bin/tclsh Tcl/Tk script text executable
8307 0 search/1/fwt #!\ /usr/bin/texlua LuaTex script text executable
8310 0 search/1/fwt #!\ /usr/bin/luatex LuaTex script text executable
8313 0 search/1/fwt #!\ /usr/bin/stap Systemtap script text executable
8319 0 string/fwt #!\ /command/execlineb execline script text executable
8321 0 string/fwt #!\ /bin/execlineb execline script text executable
8323 0 string/fwt #!\ /usr/bin/execlineb execline script text executable
8325 0 string/fwt #!\ /usr/bin/env\ execlineb execline script text executable
8329 >0 regex \^#!.*/bin/execlineb([[:space:]].*)*$ execline script text executable
8341 0 search/1/w #!\ /usr/local/bin/php PHP script text executable
8344 0 search/1/w #!\ /usr/bin/php PHP script text executable
9350 0 string PS-X\ EXE Sony Playstation executable
9367 0 string CPE CPE executable
9372 0 string XBEH Microsoft Xbox executable
9373 !:mime audio/x-xbox-executable
9431 0 string XEX2 Microsoft Xbox 360 executable
9432 !:mime audio/x-xbox360-executable
9438 0 string XEX1 Microsoft Xbox 360 executable (XEX1)
9439 !:mime audio/x-xbox360-executable
9944 0x00 string NSO0 Nintendo Switch executable (NSO)
10015 0 belong 0513 Convex old-style demand paged executable
10017 0 belong 0515 Convex old-style pre-paged executable
10019 0 belong 0517 Convex old-style pre-paged, non-swapped executable
10051 >84 belong &0x80000000 executable
11422 >>22 leshort&030000 !020000 executable
11855 >16 leshort 2 executable,
11856 !:mime application/x-executable
11857 >16 leshort 3 ${x?pie executable:shared object},
11859 !:mime application/x-${x?pie-executable:sharedlib}
11864 >>16 leshort 0xFE01 executable,
11865 !:mime application/x-executable
12177 >20 short 0x107 executable
12178 >20 short 0x108 pure executable
12179 >20 short 0x10b demand-paged executable
12180 >20 short 0x10f unsupported executable
12185 0 short 0x155 Encore unsupported executable
12251 0 lelong 0x1000007A Psion Series 5 executable
15782 # schemes for distinguishing between executable images, shared libraries,
15796 # an executable, and is dynamically-linked if the "has run-time
15804 # a dynamically-linked executable;
15811 # if the entry point is non-zero, it's an executable, otherwise
15817 # a dynamically-linked executable, otherwise it's just an
15818 # executable.
15828 # it's a dynamically-linked executable);
15831 # set, then it's just an executable.
15854 >>3 byte&0x80 0x80 dynamically linked executable
15855 >>3 byte&0x80 0x00 executable
15864 >>3 byte&0x80 0x80 dynamically linked executable
15865 >>3 byte&0x80 0x00 executable
15874 >>3 byte&0x80 0x80 dynamically linked executable
15875 >>3 byte&0x80 0x00 executable
15884 >>3 byte&0x80 0x80 dynamically linked executable
15885 >>3 byte&0x80 0x00 executable
16831 >40 byte 1 executable
17036 # mo extension is also used for Easeus Partition Master PE32 executable module
17628 0 beshort 0627 Apollo m68k COFF executable
17631 0 beshort 0624 apollo a88k COFF executable
17640 0 belong 0x02100107 PA-RISC1.1 executable
17645 0 belong 0x02100108 PA-RISC1.1 shared executable
17650 0 belong 0x0210010b PA-RISC1.1 demand-load executable
17664 0 belong 0x02140107 PA-RISC2.0 executable
17669 0 belong 0x02140108 PA-RISC2.0 shared executable
17674 0 belong 0x0214010b PA-RISC2.0 demand-load executable
17688 0 belong 0x020b0107 PA-RISC1.0 executable
17693 0 belong 0x020b0108 PA-RISC1.0 shared executable
17698 0 belong 0x020b010b PA-RISC1.0 demand-load executable
17710 0 long 0x02080106 HP s500 relocatable executable
17713 0 long 0x02080107 HP s500 executable
17716 0 long 0x02080108 HP s500 pure executable
17720 0 belong 0x020c0108 HP s200 pure executable
17727 0 belong 0x020c0107 HP s200 executable
17734 0 belong 0x020c010b HP s200 demand-load executable
17741 0 belong 0x020c0106 HP s200 relocatable executable
17748 0 belong 0x020a0108 HP s200 (2.x release) pure executable
17752 0 belong 0x020a0107 HP s200 (2.x release) executable
18032 #>0 string HU X executable
18037 #0 beshort 0x601a Human68k Z executable
18044 #>4 string LZX R executable
18045 #2 string #HUPAIR Human68k hupair R executable
18051 # "ibm370" said that 0x15d == 0535 was "ibm 370 pure executable".
18055 # 0 short 0535 370 sysV executable
18059 # 0 short 0530 370 sysV pure executable
18066 0 beshort 0537 370 XA sysV executable
18070 0 beshort 0532 370 XA sysV pure executable
18074 0 beshort 054001 370 sysV pure executable
18076 0 beshort 055001 370 XA sysV pure executable
18078 0 beshort 056401 370 sysV executable
18080 0 beshort 057401 370 XA sysV executable
18082 0 beshort 0531 SVR2 executable (Amdahl-UTS)
18085 0 beshort 0534 SVR2 pure executable (Amdahl-UTS)
18088 0 beshort 0530 SVR2 pure executable (USS/370)
18091 0 beshort 0535 SVR2 executable (USS/370)
18103 0 beshort 0x01df executable (RISC System/6000 V3.1) or obj module
18106 #0 beshort 0x0103 executable (RT Version 2) or obj module
18122 0 beshort 0x01f7 64-bit XCOFF executable or object module
18424 >>24 string Exec with executable chunk
22380 # Various flavors of x86 UNIX executable/object (other than Xenix, which
22391 0 leshort 0502 basic-16 executable
22394 0 leshort 0503 basic-16 executable (TV)
22397 0 leshort 0510 x86 executable
22399 0 leshort 0511 x86 executable (TV)
22401 0 leshort =0512 iAPX 286 executable small model (COFF)
22404 0 leshort =0522 iAPX 286 executable large model (COFF)
22411 # ./intel (version 5.25) label labeled the next entry as "80386 COFF executable"
22412 # SGI labeled the next entry as "iAPX 386 executable" --Dan Quinlan
22427 # F_EXEC flag bit implies Intel ia64 COFF executable
22505 # initialization vector with executable code; often near JuMP instruction E9 yy zz
22832 0 string/w #!/bin/node Node.js script text executable
22834 0 string/w #!/usr/bin/node Node.js script text executable
22836 0 string/w #!/bin/nodejs Node.js script text executable
22838 0 string/w #!/usr/bin/nodejs Node.js script text executable
22840 0 string #!/usr/bin/env\ node Node.js script text executable
22842 0 string #!/usr/bin/env\ nodejs Node.js script text executable
23547 # >0 leshort 0407 impure executable (OMAGIC)
23548 # >0 leshort 0410 pure executable (NMAGIC)
23549 # >0 leshort 0413 demand-paged executable (ZMAGIC)
23550 # >0 leshort 0314 demand-paged executable (QMAGIC)
23552 0 lelong 0x00640107 Linux/i386 impure executable (OMAGIC)
23554 0 lelong 0x00640108 Linux/i386 pure executable (NMAGIC)
23556 0 lelong 0x0064010b Linux/i386 demand-paged executable (ZMAGIC)
23558 0 lelong 0x006400cc Linux/i386 demand-paged executable (QMAGIC)
23564 0 string \01\03\020\04 Linux-8086 impure executable
23566 0 string \01\03\040\04 Linux-8086 executable
23571 0 string \01\03\020\20 Minix-386 impure executable
23573 0 string \01\03\040\20 Minix-386 executable
23575 0 string \01\03\04\20 Minix-386 NSYM/GNU executable
23584 # this can be overridden by the DOS executable (COM) entry
23685 >510 leshort 0xAA55 x86 boot executable
23777 0x24 lelong 0x016f2818 Linux kernel ARM boot executable zImage
23786 0x24 belong 0x016f2818 Linux kernel ARM boot executable zImage (big-endian)
23790 0x38 lelong 0x644d5241 Linux kernel ARM64 boot executable Image
23798 # Linux 8086 executable
23799 0 lelong&0xFF0000FF 0xC30000E9 Linux-Dev86 executable, headerless
23803 0 lelong&0xFF00FFFF 0x4000301 Linux-8086 executable
23817 # 0 lelong&0xFF00FFFF 0x10000301 ld86 I80386 executable
23818 # 0 lelong&0xFF00FFFF 0xB000301 ld86 M68K executable
23819 # 0 lelong&0xFF00FFFF 0xC000301 ld86 NS16K executable
23820 # 0 lelong&0xFF00FFFF 0x17000301 ld86 SPARC executable
24204 0 search/1/w #!\ /usr/bin/lua Lua script text executable
24206 0 search/1/w #!\ /usr/local/bin/lua Lua script text executable
24208 0 search/1 #!/usr/bin/env\ lua Lua script text executable
24210 0 search/1 #!\ /usr/bin/env\ lua Lua script text executable
24605 >12 belong 2 executable
24611 >12 belong 5 preload executable
26291 0 beshort 0x0160 MIPSEB ECOFF executable
26300 0 beshort 0x0162 MIPSEL-BE ECOFF executable
26309 0 beshort 0x6001 MIPSEB-LE ECOFF executable
26318 0 beshort 0x6201 MIPSEL ECOFF executable
26329 0 beshort 0x0163 MIPSEB MIPS-II ECOFF executable
26338 0 beshort 0x0166 MIPSEL-BE MIPS-II ECOFF executable
26347 0 beshort 0x6301 MIPSEB-LE MIPS-II ECOFF executable
26356 0 beshort 0x6601 MIPSEL MIPS-II ECOFF executable
26367 0 beshort 0x0140 MIPSEB MIPS-III ECOFF executable
26376 0 beshort 0x0142 MIPSEL-BE MIPS-III ECOFF executable
26385 0 beshort 0x4001 MIPSEB-LE MIPS-III ECOFF executable
26394 0 beshort 0x4201 MIPSEL MIPS-III ECOFF executable
26412 0 long 31415 Mirage Assembler m.out executable
26622 >18 beshort &00000020 executable
26629 0 beshort 0521 mc68k executable (shared)
26631 0 beshort 0522 mc68k executable (shared demand paged)
26636 0 beshort 0554 68K BCS executable
26642 0 beshort 0555 88K BCS executable
26654 0 belong&0xFFFFFFF0 0x601A0000 Atari ST M68K contiguous executable
26659 0 belong&0xFFFFFFF0 0x601B0000 Atari ST M68K non-contig executable
26666 0 beshort 0x601A Atari 68xxx executable,
26754 # ./intel already labeled COFF type 0x14c=0514 as "80386 COFF executable"
26774 >0x18 leshort <0x40 MS-DOS executable
26789 >>(0x3c.l+24) leshort 0x010b \b32 executable
26790 >>(0x3c.l+24) leshort 0x020b \b32+ executable
26873 # executable inside (which just prints a message and exits if run in win)
26906 >>(0x3c.l) string !PE\0\0 MS-DOS executable
26954 >>(0x3c.l) string LE\0\0 \b, LE executable
26989 # header data too small for extended executable
27000 # calculations (next embedded executable would be at &(&2*512+&0-2)
27021 # By now an executable type should have been printed out. The executable
27096 >>0 use lx-executable
27099 >>0 use \^lx-executable
27100 0 name lx-executable
27101 # similar looking like variant with MS-DOS stub (MZ magic): "MS-DOS executable, LX"
27102 #>0x00 uleshort x executable,
27106 >0x00 uleshort x executable
27108 !:mime application/x-lx-executable
27199 0 name msdos-driver DOS executable (
27324 >0 byte x DOS executable (
27351 # DOS executable without JuMP 16-bit instruction
27357 # COM executable without JuMP 16-bit instruction and not SCREATE.SYS
27381 # if look like COM executable with x86 boot signature then this
27384 # No x86 boot signature implies often DOS executable
27385 …eck for unrealistic high number of FATs. Then it is an unusual disk image or often a DOS executable
27396 # skip BeOS 4 bootfloppy.img done as "Linux kernel x86 boot executable" by ./linux
27412 … for unrealistic low number of FATs. Then it is an unusual FAT disk image or often a DOS executable
27447 # check for unrealistic high number of FATs. Then it is not a disk image and it is a DOS executable
27451 # check for unrealistic low number of FATs. Then it is not a disk image and it is a DOS executable
27455 # maybe disc image with valid number of FATs or DOS executable
27458 # invalid low media descriptor. Then it is not a disk image and it is a DOS executable
27461 # valid media descriptor. Then it is maybe disk image or DOS executable
27463 …ectorsize not a power of 2 from 32-32768. Then it is not a disk image and it must be DOS executable
27484 # syslinux COM32 or COM32R executable
27485 >>1 lelong&0xFFFFFFFe 0x21CD4CFe COM executable (32-bit COMBOOT
27499 # "COM executable (COM32R)" or "Syslinux COM32 module" by TrID
27522 # no DOS executable with interrupt 0x16 found
27559 >>&2 string UPX! FREE-DOS executable (COM), UPX
27570 252 string Must\ have\ DOS\ version DR-DOS executable (COM)
27574 #2 search/28 \xcd\x21 COM executable for MS-DOS
27576 2 string \xcd\x21 COM executable for DOS
27580 4 string \xcd\x21 COM executable for DOS
27584 5 string \xcd\x21 COM executable for DOS
27589 >0 byte !0xb8 COM executable for DOS
27594 >5 string !\xcd\x21 COM executable for DOS
27598 13 string \xcd\x21 COM executable for DOS
27606 >>17 default x COM executable for MS-DOS
27610 23 string \xcd\x21 COM executable for MS-DOS
27614 30 string \xcd\x21 COM executable for MS-DOS
27618 70 string \xcd\x21 COM executable for DOS
27622 0x6 search/0xa \xfc\x57\xf3\xa5\xc3 COM executable for MS-DOS
27625 0x6 search/0xa \xfc\x57\xf3\xa4\xc3 COM executable for DOS
27629 0x3c string W\ Collis\0\0 COM executable for MS-DOS, Compack compressed
27635 0 string/b LZ MS-DOS executable (built-in)
28164 # Note: Message file is used by executable with same main name.
29345 >20 beshort 0407 executable
29346 >20 beshort 0410 pure executable
29350 >20 beshort 0407 executable
29351 >20 beshort 0410 pure executable
29355 >20 beshort 0407 executable
29356 >20 beshort 0410 pure executable
29360 >20 beshort 0407 executable
29361 >20 beshort 0410 pure executable
29365 >20 beshort 0407 executable
29366 >20 beshort 0410 pure executable
29372 >20 beshort 0407 executable
29373 >20 beshort 0413 pure executable
29379 >20 beshort 0407 executable
29380 >20 beshort 0413 pure executable
29406 >>20 lelong =4096 dynamically linked executable
29407 >>20 lelong >4096 dynamically linked executable
29408 >0 byte ^0x80 executable
29414 >>20 lelong =8192 dynamically linked executable
29415 >>20 lelong >8192 dynamically linked executable
29416 >0 byte ^0x80 executable
29421 >0 byte &0x80 dynamically linked executable
29424 >>20 lelong !0 executable
29430 >0 byte &0x80 dynamically linked executable
29431 >0 byte ^0x80 executable
30677 >>16 leshort 2 executable,
30710 >>16 beshort 2 executable,
31047 >6 byte&0x0f 0x00 non-executable
31055 >6 byte&0xf0 0x10 program executable
31086 >0x12 byte 1 program executable
31271 >19 byte&0x02 0x02 executable
31633 # pdp: file(1) magic for PDP-11 executable/object and APL workspace
31640 0 leshort 0407 PDP-11 executable
31653 0 leshort 0410 PDP-11 pure executable
31657 0 leshort 0411 PDP-11 separate I&D executable
31664 0 leshort 0413 PDP-11 demand-paged pure executable
31667 0 leshort 0430 PDP-11 overlaid pure executable
31670 0 leshort 0431 PDP-11 overlaid separate executable
31697 0 string #!/usr/bin/env\ perl Perl script text executable
31699 0 string #!\ /usr/bin/env\ perl Perl script text executable
31702 >0 regex \^#!.*/bin/perl([[:space:]].*)*$ Perl script text executable
32806 0 belong 0x00000107 Plan 9 executable, Motorola 68k
32807 0 belong 0x00000197 Plan 9 executable, AT&T Hobbit
32808 0 belong 0x000001EB Plan 9 executable, Intel 386
32809 0 belong 0x00000247 Plan 9 executable, Intel 960
32810 0 belong 0x000002AB Plan 9 executable, SPARC
32811 0 belong 0x00000407 Plan 9 executable, MIPS R3000
32812 0 belong 0x0000048B Plan 9 executable, AT&T DSP 3210
32813 0 belong 0x00000517 Plan 9 executable, MIPS R4000 BE
32814 0 belong 0x000005AB Plan 9 executable, AMD 29000
32815 0 belong 0x00000647 Plan 9 executable, ARM 7-something
32816 0 belong 0x000006EB Plan 9 executable, PowerPC
32817 0 belong 0x00000797 Plan 9 executable, MIPS R4000 LE
32818 0 belong 0x0000084B Plan 9 executable, DEC Alpha
33151 0 long 0x50900107 Pyramid 90x family executable
33152 0 long 0x50900108 Pyramid 90x family pure executable
33154 0 long 0x5090010b Pyramid 90x family demand paged pure executable
33164 0 string/t """ Python script text executable
33387 0 search/1/w #!\040/usr/bin/python Python script text executable
33390 0 search/1/w #!\040/usr/local/bin/python Python script text executable
33393 0 search/10/w #!\040/usr/bin/env\040python Python script text executable
33400 >0 regex \^from[\040\t]+([A-Za-z0-9_]|\\.)+[\040\t]+import.*$ Python script text executable
33406 >&0 search/64 self Python script text executable
33412 >&0 search/64 '__main__' Python script text executable
33413 >&0 search/64 "__main__" Python script text executable
33419 >0 regex \^import\ [_[:alpha:]]+\ as\ [[:alpha:]][[:space:]]*$ Python script text executable
33424 #>&0 regex .*'''$ Python script text executable
33428 #>&0 regex .*"""$ Python script text executable
33435 >&0 regex \^[[:space:]]*except.*:$ Python script text executable
33438 >&0 search/4096 finally: Python script text executable
33443 >0 regex \^class\ [_[:alpha:]]+(\\(.*\\))?(\ )*:([\ \t]+pass)?$ Python script text executable
33450 >>&0 regex \\(([[:alpha:]*_,\ ]){0,255}\\):$ Python script text executable
34649 0 search/1/w #!\ /usr/bin/ruby Ruby script text executable
34652 0 search/1/w #!\ /usr/local/bin/ruby Ruby script text executable
34655 0 search/1 #!/usr/bin/env\ ruby Ruby script text executable
34658 0 search/1 #!\ /usr/bin/env\ ruby Ruby script text executable
34917 0 lelong 0x10ea BALANCE NS32000 executable (0 @ 0)
34920 0 lelong 0x20ea BALANCE NS32000 executable (invalid @ 0)
34923 0 lelong 0x30ea BALANCE NS32000 standalone executable
34933 0 leshort 0x22eb SYMMETRY i386 executable (0 @ 0)
34936 0 leshort 0x32eb SYMMETRY i386 executable (invalid @ 0)
34941 #0 leshort 0x42eb SYMMETRY i386 standalone executable
34946 >>124 lelong !28867614 SYMMETRY i386 standalone executable
35326 0 string NqNqNq`\004 QL firmware executable (BCPL)
35333 4 belong 0x4AFB QDOS executable
35335 6 beshort 0x4AFB QDOS executable
36401 >>20 belong =4096 dynamically linked executable
36402 >>20 belong >4096 dynamically linked executable
36403 >0 byte ^0x80 executable
36407 >0 byte &0x80 dynamically linked executable
36408 >0 byte ^0x80 executable
36412 >0 byte &0x80 dynamically linked executable
36413 >0 byte ^0x80 executable
36419 >>20 belong =4096 dynamically linked executable
36420 >>20 belong >4096 dynamically linked executable
36421 >0 byte ^0x80 executable
36425 >0 byte &0x80 dynamically linked executable
36426 >0 byte ^0x80 executable
36430 >0 byte &0x80 dynamically linked executable
36431 >0 byte ^0x80 executable
36437 >>20 belong =4096 dynamically linked executable
36438 >>20 belong >4096 dynamically linked executable
36439 >0 byte ^0x80 executable
36443 >0 byte &0x80 dynamically linked executable
36444 >0 byte ^0x80 executable
36448 >0 byte &0x80 dynamically linked executable
36449 >0 byte ^0x80 executable
36571 0x30 string SymExe SymbOS executable
37041 0 search/1/w #!\ /usr/bin/tcl Tcl script text executable
37043 0 search/1/w #!\ /usr/local/bin/tcl Tcl script text executable
37045 0 search/1 #!/usr/bin/env\ tcl Tcl script text executable
37047 0 search/1 #!\ /usr/bin/env\ tcl Tcl script text executable
37049 0 search/1/w #!\ /usr/bin/wish Tcl/Tk script text executable
37051 0 search/1/w #!\ /usr/local/bin/wish Tcl/Tk script text executable
37053 0 search/1 #!/usr/bin/env\ wish Tcl/Tk script text executable
37055 0 search/1 #!\ /usr/bin/env\ wish Tcl/Tk script text executable
37806 # (executable, pure, and split I&D, respectively), but the PDP-11 version
37819 #0 short 0x107 unknown machine executable
37822 #0 short 0x108 unknown pure executable
37828 #0 short 0x10b unknown pure executable
37831 0 long 0x10c unknown demand paged pure executable
37833 0 long 0x10e unknown readable demand paged pure executable
37962 0 short 0610 Perkin-Elmer executable
37964 0 beshort 0572 amd 29k coff noprebar executable
37965 0 beshort 01572 amd 29k coff prebar executable
37968 6 beshort 0407 unicos (cray) executable
37974 0 string Joy!peffpwpc header for PowerPC PEF executable
37991 # 0 string exec BugOS executable
38004 >3 string >\0 %s script text executable
38008 >3 string >\0 %s script executable (binary data)
38012 >3 string >\0 %s script text executable
38016 >3 string >\0 %s script executable (binary data)
38020 >2 string >\0 %s script text executable
38024 >2 string >\0 %s script executable (binary data)
38027 0 string/t #!\ script text executable
38031 0 string/b #!\ script executable
38037 >15 string/t >\0 %s script text executable
38041 >15 string/b >\0 %s script executable (binary data)
38045 >16 string/t >\0 %s script text executable
38049 >16 string/b >\0 %s script executable (binary data)
38061 # vax: file(1) magic for VAX executable/object and APL workspace
38070 0 lelong 0420 a.out VAX demand paged (first page unmapped) pure executable
38080 >2 uleshort <100 VAX COFF executable, sections %d
38086 >2 uleshort <100 VAX COFF pure executable, sections %d
38472 0 string \xb0\0\x30\0 VMS VAX executable
38486 >8 ubelong 0xec020000 VMS Alpha executable
38734 # For format usable in DOS, such as generic executable
40797 >0x1e leshort &0x1 executable
40807 >0 byte &0x1 executable
40817 >0x1e leshort &0x1 executable
40889 >6 leshort&0x1000 =0x0000 executable,
40903 # sim65 executable files
40904 0 string \x73\x69\x6d\x36\x35 sim65 executable,