Skip to content

Commit

Permalink
Cyanide V1.3.1
Browse files Browse the repository at this point in the history
  • Loading branch information
Noxtal committed Mar 6, 2022
1 parent 9e0d956 commit 3fb481f
Show file tree
Hide file tree
Showing 2 changed files with 9 additions and 9 deletions.
12 changes: 6 additions & 6 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,10 +44,10 @@ optional arguments:

Payloads:
```
[?] PHPCMD (min. 72 chars, necessitates 0 args) -> PHP Simple Command Injection: [PHP] Simple command injection with query variable 'c'. Usage: Ex.: ?c=ls
[?] PHPB64CMD (min. 102 chars, necessitates 0 args) -> PHP Simple Base64 Command Injection: [PHP] Simple command injection with query variable 'b', but the command is base64 and URL encoded. Usage: Ex.: ?b=bHM%3D
[?] PHPREVSHELL (min. 78 chars, necessitates 2 args) -> PHP Simple NETCAT Reverse Shell: [PHP] Simple Reverse Shell. Needs two arguments, the IP and port. WARNING: REQUIRES Netcat. Usage: Specify the arguments after choosing the payload. Ex.: -pl PHPREVSHELL 127.0.0.1 4444
[?] PHPREADFILE (min. 130 chars, necessitates 0 args) -> PHP File Reader: [PHP] Read a file's contents. Using parameter 'f' to specificy a filename. Usage: Ex.: ?f=filename.ext
[?] PHPUPLOAD (min. 328 chars, necessitates 0 args) -> PHP Simple File Upload: [PHP] Simple file upload page to pop in the logs. Usage: You should find a typical file upload section in the logs.
[?] JSCOOKIEXSS (min. 104 chars, necessitates 1 args) -> JavaScript Simple XSS Cookie Stealer: [JS] Simple XSS Cookie Stealer. Needs one argument being the link to send a request with the cookies to. Usage: Specify the URL after choosing the payload. Ex.: -pl JSCOOKIEXSS http://myurl.com/
[?] PHPCMD (min. 72 chars, requires 0 args) -> PHP Simple Command Injection: [PHP] Simple command injection with query variable 'c'. Usage: Ex.: ?c=ls
[?] PHPB64CMD (min. 102 chars, requires 0 args) -> PHP Simple Base64 Command Injection: [PHP] Simple command injection with query variable 'b', but the command is base64 and URL encoded. Usage: Ex.: ?b=bHM%3D
[?] PHPREVSHELL (min. 78 chars, requires 2 args) -> PHP Simple NETCAT Reverse Shell: [PHP] Simple Reverse Shell. Needs two arguments, the IP and port. WARNING: REQUIRES Netcat. Usage: Specify the arguments after choosing the payload. Ex.: -pl PHPREVSHELL 127.0.0.1 4444
[?] PHPREADFILE (min. 130 chars, requires 0 args) -> PHP File Reader: [PHP] Read a file's contents. Using parameter 'f' to specificy a filename. Usage: Ex.: ?f=filename.ext
[?] PHPUPLOAD (min. 328 chars, requires 0 args) -> PHP Simple File Upload: [PHP] Simple file upload page to pop in the logs. Usage: You should find a typical file upload section in the logs.
[?] JSCOOKIEXSS (min. 104 chars, requires 1 args) -> JavaScript Simple XSS Cookie Stealer: [JS] Simple XSS Cookie Stealer. Needs one argument being the link to send a request with the cookies to. Usage: Specify the URL after choosing the payload. Ex.: -pl JSCOOKIEXSS http://myurl.com/
```
6 changes: 3 additions & 3 deletions cyanide.py
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
import json
init(convert=True)

VERSION = "V1.3.0"
VERSION = "V1.3.1"

class Payload():
def __init__(self, id, name, code, argcount, desc, usage):
Expand All @@ -21,10 +21,10 @@ def build(self, args):
self.code = self.code % tuple(args)
else:
throwProgramError("PAYLOAD BUILDING ERROR",
f"Payload {self.id} necessitates {self.argcount} arguments!")
f"Payload {self.id} requires {self.argcount} arguments!")

def __str__(self):
return f"{CODES['HELP']} {self.id} (min. {len(self.code)} chars, necessitates {self.argcount} args) -> {self.name}: {self.desc} Usage: {self.usage}"
return f"{CODES['HELP']} {self.id} (min. {len(self.code)} chars, requires {self.argcount} args) -> {self.name}: {self.desc} Usage: {self.usage}"


CODES = {
Expand Down

0 comments on commit 3fb481f

Please sign in to comment.