Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/EnableSecurity/Webapp-Exploit-Payloads
a collection of payloads for common webapps
https://github.com/EnableSecurity/Webapp-Exploit-Payloads
Last synced: 3 months ago
JSON representation
a collection of payloads for common webapps
- Host: GitHub
- URL: https://github.com/EnableSecurity/Webapp-Exploit-Payloads
- Owner: EnableSecurity
- Archived: true
- Created: 2012-04-22T23:17:52.000Z (over 12 years ago)
- Default Branch: master
- Last Pushed: 2013-04-24T12:21:13.000Z (over 11 years ago)
- Last Synced: 2024-04-06T10:33:27.242Z (7 months ago)
- Language: JavaScript
- Size: 1.51 MB
- Stars: 74
- Watchers: 8
- Forks: 25
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-security-collection - **61**星
README
# Webapp Exploit Payloads
A collection of payloads for common webapps and a tool to help
generate them.## Usage:
To list the available payloads:
$ ./genpayload.py -L
To generate one big JavaScript file called `out.js`:
$ ./genpayload.py -p wordpress/newadmin -o out.js
To list valid parameters:
$ ./genpayload.py -p wordpress/newadmin -H
To pass the parameters through command line:
$ ./genpayload.py -p wordpress/newadmin -P usernewpage=http://victimsite/blog/wp-admin/user-new.php
To generate payload for crossdomain.xml exploitation:
$ ./genpayload.py -p wordpress/newadmin -t swf -P usernewpage=http://victimsite/blog/wp-admin/user-new.php
To generate payload with an html file:
$ ./genpayload.py -p wordpress/newadmin -t htmljs -P usernewpage=http://victimsite/blog/wp-admin/user-new.php
## Payload types
### JS
Outputs a single JavaScript file that contains all the necessary libraries, such as
jQuery. This can then be included in your XSS. Can also be compressed if need be.### HTMLJS
Creates a directory containing `index.html` and the included libraries. The html
file contains the payload JavaScript.### SWF
Creates a directory containing `index.html` and all libraries, including the
files needed for flXHR.### HTML5CORS
Similar to HTMLJS but makes the code work cross-domain thanks to HTML5
cross origin resource sharing. The victim server needs to trust the attacker server
through the `Access-Control-Allow-Origin: http://attackersite` header and also the header
`Access-Control-Allow-Credentials: true` needs to be set.## Directory structure
### /bin
This is where `genpayload.py` resides.
### /src
This is where all the code is generated from.
#### /src/config
A directory containing general configuration files. The file
`settings.ini` is used to store one `statusurl` for all.#### /src/includes
A directory containing files that are included by the payloads. For example,
jquery and its plugins are stored here. There is also a common.js which
contains functions that are commonly used across most payloads.#### /src/payloads
This directory contains all the payloads. The subdirectories under this one
are named after the product that they exploit, for example, wordpress.
There is one directory called generic where generic payloads are stored.Each payload has to contain a `config.ini` file that specifies the filename
of the payload, other dependencies and default variable values.## Configuration files
Each `config.ini` has the following sections:
- `[config]` where all variables that do not fit anywhere else and their values are stored
- `[locations]` where all URLs are stored .. these URLs become variables within the payload
- `[dependencies]` which contains the following options:
- `script` which is the filename of the payload
- `jquery` which is the filename of the jquery script
- `include` which is any other JavaScript files to be included in the final payload
- `[about]` which contains information about the script including:
- `description` which is a summary of what the payload does
- `[includes]` which contains variable names whose values include filenames for files
that are read by the payload generator and then their contents end up a JavaScript
string in the payload. Useful for placing that backdoor php code