Wshlient - A Simple Tool To Interact With Web Shells And Command Injection Vulnerabilities
Web Shell Client
Description & Demo
Wshlient
is a web shell client designed to be pretty simple yet versatile. One just need to create a text file containing an HTTP request and inform where Wshlient
inject the commands, then you can enjoy a shell.
In the case the above video does not works for you:
Installation
Out of python's included batteries Wshclient
only uses requests
. Just install it directly or using requirements.txt
:
$ git clone https://github.com/gildasio/wshlient$ cd wshlient$ pip install -r requirements.txt$ ./wshlient.py -h
Alternatively you can also create a symbolic link in your $PATH
to use it directly anywhere in the system:
$ ln -s $PWD/wshlient.py /usr/local/bin/wshlient
Usage
$ ./wshlient.py -husage: wshlient.py [-h] [-d] [-i] [-ne] [-it INJECTION_TOKEN] [-st START_TOKEN] [-et END_TOKEN] reqpositional arguments: req File containing raw http requestoptions: -h, --help show this help message and exit -d, --debug Enable debug output -i, --ifs Replaces whitespaces with $IFS -ne, --no-url-encode Disable command URL encode -it INJECTION_TOKEN, --injection-token INJECTION_TOKEN Token to be replaced by commands (default: INJECT) -st START_TOKEN, --start-token START_TOKEN Token that marks the output beginning -et END_TOKEN, --end-token END_TOKEN Token that marks the output ending
Contributing
You can contribute to Wshlient
by:
- Using and sharing it :)
- Firing a bug / issue
- Suggesting interesting features
- Coding
Feel free to do it, but keep in mind to keep it simple.
Source: www.kitploit.com
Wshlient - A Simple Tool To Interact With Web Shells And Command Injection Vulnerabilities
Reviewed by Zion3R
on
6:03 AM
Rating:
