Update README.md
This commit is contained in:
21
README.md
21
README.md
@@ -1,2 +1,21 @@
|
|||||||
|
> Moved to https://github.com/z0noxz/mando.me
|
||||||
|
|
||||||
|
***
|
||||||
|
|
||||||
# smplshllctrlr
|
# smplshllctrlr
|
||||||
Moved to https://github.com/z0noxz/mando.me
|
PHP Command Injection exploitation tool
|
||||||
|
|
||||||
|
1. Exploit web page and upload simple-shell.php (or simply find an existing exploitable command injection).
|
||||||
|
2. Execute the controller to exploit the command injection vulnerability.
|
||||||
|
The controller is simply a command injection exploitation tool, and can therefore with a few adjustments be rewritten to exploit allready existing vulnerabilities without the need for uploading the 'simple-shell.php'.
|
||||||
|
|
||||||
|
### Featuers (so far)
|
||||||
|
1. File upload
|
||||||
|
2. File download
|
||||||
|
3. Normal terminal commands (excluding prompts e.g. password)
|
||||||
|
4. Meterpreter reverse shell injection
|
||||||
|
|
||||||
|
### DISCLAIMER:
|
||||||
|
You shall not misuse this tool to gain unauthorized access.
|
||||||
|
This tool should only be used to expand knowledge, and not for causing malicious or damaging attacks.
|
||||||
|
Performing any attacks without written permission from the owner of the system is illegal.
|
||||||
|
|||||||
Reference in New Issue
Block a user