Skip to content

Instantly share code, notes, and snippets.

@thesp0nge
Last active March 15, 2019 11:18
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save thesp0nge/b86e9350df45b0a3e05d77283b695b7d to your computer and use it in GitHub Desktop.
Save thesp0nge/b86e9350df45b0a3e05d77283b695b7d to your computer and use it in GitHub Desktop.
A Skeleton for my remote exploit stuff
#!/usr/bin/env python
import sys
import socket
def exploit(target, port):
s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((target, port))
data=s.recv(1024)
print(data)
junk="A" * 5000
s.send(junk)
s.close()
if __name__ == "__main__":
if len(sys.argv) != 3:
print("[!] usage %s ip port" % sys.argv[0])
sys.exit(-1)
exploit(sys.argv[1], int(sys.argv[2]))
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment