Skip to content
This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)
Shell
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
README.md
start.sh

README.md

WhatsRCE

This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)

  1. Auto install GCC (no harm command, you can see this is open-source)
  2. Saving to .GIF file

How To Use ?

sudo apt install git
git clone https://github.com/KeepWannabe/WhatsRCE
cd WhatsRCE && bash start.sh

How Get Shell ?

  1. You just send the .GIF file to victim user AS A DOCUMENT NOT IMAGES
  2. And set the nc / netcat to port you set on the WhatsRCE tools {nc -lnvp your_port}
  3. You can use the Social Engineering attack so that victims can be attracted to launch this exploit
  4. tell the victim to open the gallery via whatsapp and send the victim to send any photos (no need, it's just got to the gallery no problem) after that a few seconds later you will receive a shell connection from the victim

or just watch this

DEMO VIDEO https://drive.google.com/file/d/1T-v5XG8yQuiPojeMpOAG6UGr2TYpocIj/view if the above link is not accessible https://drive.google.com/open?id=1X9nBlf5oj5ef2UoYGOfusjxAiow8nKEK

How To Avoid This Attack?

  1. Update your whatsapp to the latest version (Patched on Version 2.19.244)
  2. how to receive any file including audio images and others from people we don't know

Thanks to awakened1712 - Edo Maland - IndoXploit

This is only for learning, consequences etc. if you use it for a crime I am not responsible!

You can’t perform that action at this time.