diff --git a/README.md b/README.md index 45e9fba..92ad94a 100644 --- a/README.md +++ b/README.md @@ -44,10 +44,10 @@ optional arguments: Payloads: ``` -[?] PHPCMD (min. 72 chars, necessitates 0 args) -> PHP Simple Command Injection: [PHP] Simple command injection with query variable 'c'. Usage: Ex.: ?c=ls -[?] PHPB64CMD (min. 102 chars, necessitates 0 args) -> PHP Simple Base64 Command Injection: [PHP] Simple command injection with query variable 'b', but the command is base64 and URL encoded. Usage: Ex.: ?b=bHM%3D -[?] PHPREVSHELL (min. 78 chars, necessitates 2 args) -> PHP Simple NETCAT Reverse Shell: [PHP] Simple Reverse Shell. Needs two arguments, the IP and port. WARNING: REQUIRES Netcat. Usage: Specify the arguments after choosing the payload. Ex.: -pl PHPREVSHELL 127.0.0.1 4444 -[?] PHPREADFILE (min. 130 chars, necessitates 0 args) -> PHP File Reader: [PHP] Read a file's contents. Using parameter 'f' to specificy a filename. Usage: Ex.: ?f=filename.ext -[?] PHPUPLOAD (min. 328 chars, necessitates 0 args) -> PHP Simple File Upload: [PHP] Simple file upload page to pop in the logs. Usage: You should find a typical file upload section in the logs. -[?] JSCOOKIEXSS (min. 104 chars, necessitates 1 args) -> JavaScript Simple XSS Cookie Stealer: [JS] Simple XSS Cookie Stealer. Needs one argument being the link to send a request with the cookies to. Usage: Specify the URL after choosing the payload. Ex.: -pl JSCOOKIEXSS http://myurl.com/ +[?] PHPCMD (min. 72 chars, requires 0 args) -> PHP Simple Command Injection: [PHP] Simple command injection with query variable 'c'. Usage: Ex.: ?c=ls +[?] PHPB64CMD (min. 102 chars, requires 0 args) -> PHP Simple Base64 Command Injection: [PHP] Simple command injection with query variable 'b', but the command is base64 and URL encoded. Usage: Ex.: ?b=bHM%3D +[?] PHPREVSHELL (min. 78 chars, requires 2 args) -> PHP Simple NETCAT Reverse Shell: [PHP] Simple Reverse Shell. Needs two arguments, the IP and port. WARNING: REQUIRES Netcat. Usage: Specify the arguments after choosing the payload. Ex.: -pl PHPREVSHELL 127.0.0.1 4444 +[?] PHPREADFILE (min. 130 chars, requires 0 args) -> PHP File Reader: [PHP] Read a file's contents. Using parameter 'f' to specificy a filename. Usage: Ex.: ?f=filename.ext +[?] PHPUPLOAD (min. 328 chars, requires 0 args) -> PHP Simple File Upload: [PHP] Simple file upload page to pop in the logs. Usage: You should find a typical file upload section in the logs. +[?] JSCOOKIEXSS (min. 104 chars, requires 1 args) -> JavaScript Simple XSS Cookie Stealer: [JS] Simple XSS Cookie Stealer. Needs one argument being the link to send a request with the cookies to. Usage: Specify the URL after choosing the payload. Ex.: -pl JSCOOKIEXSS http://myurl.com/ ``` diff --git a/cyanide.py b/cyanide.py index d98d7dc..98b87b4 100755 --- a/cyanide.py +++ b/cyanide.py @@ -5,7 +5,7 @@ import json init(convert=True) -VERSION = "V1.3.0" +VERSION = "V1.3.1" class Payload(): def __init__(self, id, name, code, argcount, desc, usage): @@ -21,10 +21,10 @@ def build(self, args): self.code = self.code % tuple(args) else: throwProgramError("PAYLOAD BUILDING ERROR", - f"Payload {self.id} necessitates {self.argcount} arguments!") + f"Payload {self.id} requires {self.argcount} arguments!") def __str__(self): - return f"{CODES['HELP']} {self.id} (min. {len(self.code)} chars, necessitates {self.argcount} args) -> {self.name}: {self.desc} Usage: {self.usage}" + return f"{CODES['HELP']} {self.id} (min. {len(self.code)} chars, requires {self.argcount} args) -> {self.name}: {self.desc} Usage: {self.usage}" CODES = {