-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Explpit #7
Comments
Same here. I've followed all the instructions to a tee, but still can't get reverse shell. My phone loads the page with mp4 and I see the connection details on the linux server side. But the server keeps reloading the page and no back connection at all. If you're interested in the details, it's here. |
Same here on a LG-D620. Any updates? |
@dvolvox |
This exploit doesn't work in GT-N5100 in official android and Cyanogenmod 11 or 12.1, but in stagefright detector, my device is vulnerable. My shellcode.bin in attached file(Shellcode - reverse_tcp host 192.168.1.21 port 1996).
shellcode.bin.zip
The text was updated successfully, but these errors were encountered: