-
Notifications
You must be signed in to change notification settings - Fork 481
Open
Description
This is the error
[%] CVE-2021-40444 - MS Office Word RCE Exploit [%]
[*] Option is generate a malicious payload...
[ == Options == ]
[ DLL Payload: test/calc.dll
[ HTML Exploit URL: http://192.168.1.2
[] Writing HTML Server URL...
[] Generating malicious docx file...
sh: 1: zip: not found
[] Generating malicious CAB file...
[] Updating information on HTML exploit...
Traceback (most recent call last):
File "/home/rmb/CVE-2021-40444/exploit.py", line 154, in
generate_payload()
File "/home/rmb/CVE-2021-40444/exploit.py", line 119, in generate_payload
p_exp = open('word.html', 'r')
OSError: [Errno 22] Invalid argument: 'word.html'
how can fix that
Metadata
Metadata
Assignees
Labels
No labels