ronin-payloads
ronin-payloads copied to clipboard
A Ruby micro-framework for writing and running exploit payloads
Add a built-in encoder which converts a shell command into a base64 encoded string that's decoded using `base64 -d` or possibly `openssl enc -base64 -d`. ```shell eval $(echo #{base64_encoded_cmd_goes_here) |...
Add a built-in encoder which converts a shell command into a hexstring that's decoded using `xxd -r -ps`. ```shell eval $(echo #{hex-digits-go-here} | xxd -r -ps) ```
Similar to the builtin `php/download_exec` payload, there should be a `cmd/download_exec` payload which calls `wget` or `curl` to download a file, `chmod +x`, and then executes it.
Add a generic `test/reverse_shell` payload which just starts a local server socket and accepts a reverse shell connection. This can be used to interact with other reverse-shell payloads that were...
Add a generic `test/bind_shell` payload which just connects to a remote bind-shell. This will allow interacting with other bind-shell payloads that were manually started on the target server.
Add a `build_war` method for generating `.war` archives.
Add a `build_jar` method for generating `.jar` archives.
Add a ColdFusion web shell that can execute a command and return the output, wrapped in HTML. Example: https://github.com/tennc/webshell/blob/master/net-friend/cfm/cfmShell.cfm
Add a `asp.net/web_shell` payload that can execute a command and return the output, wrapped in HTML. Example: https://github.com/tennc/webshell/blob/master/fuzzdb-webshell/asp/cmd.aspx