Giter VIP home page Giter VIP logo

aigptcode / autoshell Goto Github PK

View Code? Open in Web Editor NEW
10.0 3.0 2.0 38 KB

This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypass security measures and upload files in a hidden manner. In the following, the technical details of the code and the techniques used will be explained.

Python 100.00%
fud fud-crypter fud-stealer hack hacking hacking-tool rat shell shell-script shell-scripts

autoshell's Introduction

AutoShell

IMG-1321
IMG-1323

This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypass security measures and upload files in a hidden manner. In the following, the technical details of the code and the techniques used will be explained.

Different parts of the code:

  1. Initial settings: In this section, the necessary variables for running the code are defined. Some of these variables include:
    • logger: A logging class object used to keep track of events and errors in the code.
    • RANDOM_COMMANDS: A list of random commands that are used to execute the code on the server.
    • IMAGE_FILE: A string that represents the name of the image file used to hide the code in it.
  2. Generating random code: The generate_random_shell and random_shell_name functions are defined in this section. The generate_random_shell function generates a random code using one of the random commands from the RANDOM_COMMANDS list. The random_shell_name function generates a random name for the code file.
  3. Finding the upload point: The find_upload_point function is used to find the file upload point on a website. This function uses the requests and BeautifulSoup libraries to retrieve the main page of the website and then finds the forms that have a file upload field. If no form is found, this function finds a list of website links using the ContentDiscovery class and then finds the forms that have a file upload field for each link.
  4. Uploading the file: The upload_file function is used to upload the file to an upload point. This function uses various techniques to bypass security measures and upload the file in a hidden manner. Some of these techniques include:
    • Changing the file extension: This technique uses a unknown file extension to bypass website security.
    • Adding null byte character: This technique adds a null byte character to the end of the file name to bypass website security.
    • Adding double extension: This technique adds a double extension to the file name to bypass website security.
    • Increasing file size: This technique increases the file size to bypass website security.
    • Adding code to an image: This technique adds the code to an image file to hide the code and bypass website security.
    • Using base64 encoding: This technique encodes the file using base64 encoding to hide the code and bypass website security.
    • Using gzinflate: This technique compresses the file using gzinflate to hide the code and bypass website security.
    • Using eval: This technique uses the JavaScript eval function to execute the code and bypass website security.
    • Using data URI: This technique uses data URI to hide the code and bypass website security.
    • Using custom extension: This technique uses a custom file extension for the file to bypass website security.
    • Using polyglot file: This technique creates a polyglot file to hide the code and bypass website security.
    • Using steganography: This technique hides the code in an image using steganography to bypass website security.
  5. Testing and execution: The try_upload_methods function is used to test and execute the find_upload_point and upload_file functions. This function tries to find the file upload point and then uploads the file in a hidden manner for each website entered by the user. If the upload is successful, the address of the uploaded file on the website is printed.

Finally, the main function is used to run the code and get user inputs. This function generates a random name for the file and then tries to upload the file to the website using the try_upload_methods function.

This code is a powerful tool for finding vulnerabilities and file upload points on a website. Using various techniques to bypass website security and upload files in a hidden manner, this tool can be very useful for testing website security. It should be noted that the use of this tool should be done responsibly and with the necessary permissions.

autoshell's People

Contributors

aigptcode avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar

Forkers

kataki clonerdev

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.