Skip to content

raihansltn/PHP-8.1.0-Dev-Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 

Repository files navigation

Written By: Toughrebel4041

Overview:

This script is designed to exploit a vulnerability in web applications using PHP version 8.1.0-dev. It should only be used on systems where you have explicit permission to test and exploit vulnerabilities.


Usage:

To use the script, you need to provide the target URL as a command-line argument. Here's an example:

$ python3 ExploitScript.py <Your URL here>
PHP Version 8.1.0-Dev Exploit (Permission Granted)((Can Confirm))(((No?)))
I uh... Checking PHP version . . . 
PHP version is: PHP/8.1.0-dev
Can Confirm this vulnerable.
Just wanna make sure you REALLY got permission for this.
Ight then, Wait, exploit is working (Permission Granted)((I Can confirm))
$ >

Replace that Your URL here with your URL, but dont use that sharpy brackets thingy, how do I write it on README AHHHH


How it Works:

The script first checks the PHP version of the target URL. If the version is 8.1.0-dev, it proceeds with the exploit. If not, it continues with the exploit regardless hehehehe. The exploit involves sending a POST request to the target URL with specific headers and data. This is designed to trigger the vulnerability and execute arbitrary commands on the server. The script uses the requests library to send HTTP requests and the re library to parse the response.


Disclaimer:

This script is provided for educational and research purposes only. It should only be used on systems where you have explicit permission to test and exploit vulnerabilities. Unauthorized access or exploitation of systems can result in severe legal consequences. Use at your own risk. Really guys... just use it for Pentest Lab or sum like that, dont use it for something else, beg it. :(

About

PHP-8.1.0-Dev-Exploit

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages