giuseppesec
giuseppesec
I'm trying to demonstrate a reverse shell from emulated devices that have command injection vulnerabilities, and in the case of the Tenda, I'm get a no route to host error...
I've provided a proof of concept with an explanation in this repo: https://github.com/guusec/VSeeDoS
This would be super cool since some clients use IPv6 addresses for public dev environments.
### Description of the feature you're suggesting. Wondering if it would be possible to implement these features in the BLETX app. Currently it only supports advertisements. Think it'd be really...
uses the same parsing logic but just also parses local files