Skip to content

websecnl/RCE_Universal_Exploiter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

RCE_Universal_Exploiter

Remote Code Execution exploiter

Python interperter version: 2.7.11

to execute run: ./python rce_exploiter.py

don't forget to edit target url.

the example target vulnerable PHP code is: echo shell_exec($_GET['vulnerable_var']);

As a condition of your use of this script, you warrant to websec that you will not use this script for any purpose that is unlawful or that is prohibited by law. we are ok if you use this for corporate purposes just always ask signed permission (on paper) first before performing any pentest!

About

Remote Code Execution exploiter

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages