rMETAshell: Injecting Commands via Metadata for Remote Execution
rMETAshell takes a shell command and an image, video or text file as input. It then injects the command into the file using metadata comments. After injection, it generates a one-liner execution method for retrieving and executing the injected command from a remote location.
Inject shell commands into the media file metadata. Enter manually or customize your arsenal!
Generate the execution method!
Injection completed!
Features
- Metadata Injection: Inject shell commands into media and text files efficiently.
- One-Liner Generation: Create executable one-liners for various environments and purposes.
- Customization: Flexibility in choosing predefined scripts or adding custom commands.
- Cross-Platform Compatibility: Support for multiple media and text file formats.
Installation
Clone the repository
git clone https://github.com/git5loxosec/METAshell.git
Navigate to the METAshell directory
cd METAshell
Make the script executable
chmod +x METAshell.sh
Usage
./METAshell.sh [OPTIONS] <filename> <URL>
Options:
-h, --help Display help. -c, --choose Choose a script from a list.
Arguments:
Name of the file to inject. URL to upload the file. File Format Compatibility Lists of compatible media and text file formats are provided to ensure reliable injection.
Contributing
Contributions are what make the open-source community an amazing place to learn, inspire, and create. Any contributions you make are greatly appreciated.
Disclaimer
METAshell is intended for educational and ethical use only. Any misuse of this tool for malicious activities is strictly prohibited.