A mass exploitation tool for CVE 2020-8793
The Shodan API to find vulnerable devices and mass sends a payload to the target
To customize the payload :
s.send(bytes(f'MAIL FROM:<;{payload};>\r\n', 'utf-8'))
Change the variable 'payload' to your desired payload
- Release Main Code
- Add Threading
- Add Payload Input
- Make Error Outputs
- Make Time Logs
- Tested Systems:
- Parrot OS Home
- Kali Linux Mate
- Windows 10
- Windows 7
- Ubuntu 20.1