Skip to content

A tool to exploit imagetragick vulnerability to gain remote code execution

Notifications You must be signed in to change notification settings

jcrashkit/imagetragick

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

imagetragick

A simple script to exploit imagetragick vulnerability to gain remote code execution

Ensure you have portforwarded to receive connections

python2.7 is been setted up as system path

Tested on mac and ubuntu

###Usage ./imagik.py

$ python imagik.py
1.)Execute the py script
2.)Now give the (Public Ip) to connect back
3.)netcat will be waiting for reverse shell at port 4444
3.)Upload the .mvg file to the website you are testing 
5.)If site is vulnerable to the attack you will get the reverse shell via terminal
.......

About

A tool to exploit imagetragick vulnerability to gain remote code execution

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%