Skip to content

lakshan-sameera/GitStack-2.3.10-Unauthenticated-Remote-Code-Execution-full-pseudoshell-environment-

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

#GitStack-2.3.10-Unauthenticated-Remote-Code-Execution-full-pseudoshell-environment-

#Exploit: GitStack 2.3.10 Unauthenticated Remote Code Execution

#Date: 2024.6.27

#By: lakshan_sameera

#Category: remote

#This is a further modification of exploit https://www.exploit-db.com/exploits/43777

To run ,

first download the script file then give it execution permission

	chmod +x [filename].py

then,nuse a test editor to edit the ip address inside the script and replace it with your vulnerable server IP

	ip= '[x.x.x.x]'

if you need you can change the exploit name that you going to to use

About

#Exploit: GitStack 2.3.10 Unauthenticated Remote Code Execution # Date: 2024.6.27 # By: Lakshan Sameera(trexthedino) # Category: remote

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages