Skip to content

RaxoCoding/text4shell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Installation

git clone https://giturl.com
cd text4shell && pip install -r requirements.txt

Usage

Scan URL(s) forms and try injecting payload

python text4shell.py -u <URL>

OR

python text4shell.py -uf <URL_FILE>

Attempt injection on specific parameter(s)

python text4shell.py -u <URL> -p <PARAM>

OR

python text4shell.py -u <URL> -pf <PARAM_FILE>

Was tested using this tutorial: https://infosecwriteups.com/text4shell-poc-cve-2022-42889-f6e9df41b3b7

About

Tool that auomatically check's if a url/param is vulnerable to text4shell

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages