crash.software
Projects
Pull Requests
Issues
Builds
OWASSRF-CVE-2022-41082_TabShell-CVE-2022-41076
Code
Files
Commits
Branches
Tags
Pull Requests
Code Comments
Code Compare
Issues
List
Boards
Milestones
Builds
Statistics
Contributions
Source Lines
Child Projects
Projects
STRLCPY
OWASSRF-CVE-2022-41082_TabShell-CVE-2022-41076
Files
🤬
Sign In
main
ROOT
/
poc.py
Search
History
187 lines
|
ISO-8859-1
|
5 KB
Blame
Outline
2
4
8
No wrap
Soft wrap
Outline
threading
argparse
os
base64
HTTPServer
BaseHTTPRequestHandler
ThreadingMixIn
requests
s
ThreadedHTTPServer
(ThreadingMixIn,HTTPServer)
ExchangeExploitHandler
(BaseHTTPRequestHandler)
do_POST
(self)
login
(username,passwd)
start_rpc_server
()
server_thread
exploit
(username)
sys
PowerShell
RunspacePool
WSMan
powershell_base64encode
(cmd)
modify_pypsrp
(cmd)
parser
args
host
user
passwd
cmd_file
cmd
All occurrences
Please wait...
Page is in error, reload to recover