Potatoes Potatoes
This commit is contained in:
parent
4fb2e30bbd
commit
1cded84850
336
linpeas.sh
336
linpeas.sh
File diff suppressed because one or more lines are too long
@ -5,9 +5,13 @@ download () {
|
|||||||
wget --no-verbose "$1" -O "$tmpfile"
|
wget --no-verbose "$1" -O "$tmpfile"
|
||||||
status=$?
|
status=$?
|
||||||
if [ $status -eq 0 ]; then
|
if [ $status -eq 0 ]; then
|
||||||
|
if [ -f "$2" ]; then
|
||||||
old_permissions=$(stat -c "%a" "$2")
|
old_permissions=$(stat -c "%a" "$2")
|
||||||
mv "$tmpfile" "$2"
|
mv "$tmpfile" "$2"
|
||||||
chmod "$old_permissions" "$2"
|
chmod "$old_permissions" "$2"
|
||||||
|
else
|
||||||
|
mv "$tmpfile" "$2"
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -61,3 +65,7 @@ fi
|
|||||||
echo "Updating windows tools…"
|
echo "Updating windows tools…"
|
||||||
download https://live.sysinternals.com/accesschk.exe win/accesschk.exe
|
download https://live.sysinternals.com/accesschk.exe win/accesschk.exe
|
||||||
download https://live.sysinternals.com/accesschk64.exe win/accesschk64.exe
|
download https://live.sysinternals.com/accesschk64.exe win/accesschk64.exe
|
||||||
|
download https://github.com/k4sth4/Juicy-Potato/raw/main/x86/jp32.exe win/JuicyPotato.exe
|
||||||
|
download https://github.com/k4sth4/Juicy-Potato/raw/main/x64/jp.exe win/JuicyPotato64.exe
|
||||||
|
download https://github.com/uknowsec/SweetPotato/raw/master/SweetPotato-Webshell-new/bin/Release/SweetPotato.exe win/SweetPotato.exe
|
||||||
|
download https://github.com/BeichenDream/GodPotato/releases/latest/download/GodPotato-NET4.exe win/GodPotato.exe
|
@ -14,7 +14,7 @@ def serve_file(listen_sock, path, forever=False):
|
|||||||
try:
|
try:
|
||||||
print('[+] Connection from', client_address)
|
print('[+] Connection from', client_address)
|
||||||
|
|
||||||
with open(FILENAME, "rb") as f:
|
with open(path, "rb") as f:
|
||||||
content = f.read()
|
content = f.read()
|
||||||
connection.sendall(content)
|
connection.sendall(content)
|
||||||
|
|
||||||
@ -31,7 +31,7 @@ if __name__ == "__main__":
|
|||||||
|
|
||||||
parser = argparse.ArgumentParser(description="File Transfer using netcat")
|
parser = argparse.ArgumentParser(description="File Transfer using netcat")
|
||||||
parser.add_argument("--port", type=int, required=False, default=None, help="Listening port")
|
parser.add_argument("--port", type=int, required=False, default=None, help="Listening port")
|
||||||
parser.add_argument("--path", type=str, required=True, help="Path to the file you wish to upload")
|
parser.add_argument(type=str, dest="path", help="Path to the file you wish to upload")
|
||||||
args = parser.parse_args()
|
args = parser.parse_args()
|
||||||
|
|
||||||
path = args.path
|
path = args.path
|
||||||
@ -40,12 +40,12 @@ if __name__ == "__main__":
|
|||||||
exit(1)
|
exit(1)
|
||||||
|
|
||||||
address = util.get_address()
|
address = util.get_address()
|
||||||
sock = util.open_server(address, args.port)
|
listen_sock = util.open_server(address, args.port)
|
||||||
if not sock:
|
if not listen_sock:
|
||||||
exit(1)
|
exit(1)
|
||||||
|
|
||||||
print("[+] Now listening, download file using:")
|
print("[+] Now listening, download file using:")
|
||||||
print('nc %s %d > %s' % (address, sock.getsockname()[1], os.path.basename(path)))
|
print('nc %s %d > %s' % (address, listen_sock.getsockname()[1], os.path.basename(path)))
|
||||||
print()
|
print()
|
||||||
|
|
||||||
serve_file(listen_sock, path, forever=True)
|
serve_file(listen_sock, path, forever=True)
|
||||||
|
BIN
win/GodPotato.exe
Normal file
BIN
win/GodPotato.exe
Normal file
Binary file not shown.
BIN
win/JuicyPotato.exe
Normal file
BIN
win/JuicyPotato.exe
Normal file
Binary file not shown.
BIN
win/JuicyPotato64.exe
Normal file
BIN
win/JuicyPotato64.exe
Normal file
Binary file not shown.
BIN
win/SweetPotato.exe
Normal file
BIN
win/SweetPotato.exe
Normal file
Binary file not shown.
Loading…
Reference in New Issue
Block a user