Bypass Python sandboxes
Command Execution Libraries
os.system("ls")
os.popen("ls").read()
commands.getstatusoutput("ls")
commands.getoutput("ls")
commands.getstatus("file/path")
subprocess.call("ls", shell=True)
subprocess.Popen("ls", shell=True)
pty.spawn("ls")
pty.spawn("/bin/bash")
platform.popen("ls").read()
#Other interesting functions
open("/etc/passwd").read()
open('/var/www/html/input', 'w').write('123')Importing
Executing python code
Compiling
Builtins
No Builtins
Python3
Finding types
Dissecting functions
dir
globals
References
最后更新于