This exploitation script is meant to be used by pentesters against active JDWP service, in order to gain Remote Code Execution.
Base on https://github.com/IOActive/jdwp-shellifier . Thanks for @hugsy
usage: poc.py [-h] -t IP [-p PORT] [-c COMMAND] poc.py: error: argument -t/--target is required
Added a new way to execute commands, learn from MSF exploit. In this way you can execute the command immediately instead of waiting for a breakpoint event.
https://docs.oracle.com/en/java/javase/11/docs/specs/jpda/architecture.html https://docs.oracle.com/en/java/javase/11/docs/specs/jpda/jpda.html https://docs.oracle.com/en/java/javase/11/docs/specs/jdwp/jdwp-spec.html https://docs.oracle.com/en/java/javase/11/docs/specs/jdwp/jdwp-protocol.html https://github.com/IOActive/jdwp-shellifier https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/java_jdwp_debugger.rb