CVE 2020 11932 Save

Double-Free BUG in WhatsApp exploit poc.

Project README

CVE-2020-11932

Double-Free bug in WhatsApp exploit poc.

#Note: Make sure to set the listner ip in exploit.c inorder to get shell

  • nc -lvp 1337 or whatever port.

  • and then compile.

  • make

  • or

  • gcc -o exploit egif_lib.c exploit.c

  • then run ./exploit and save the content to .gif

  • and send to victim.

Source

https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/.

Poc_Video

https://drive.google.com/file/d/1XP7K5zkKEhmbEONvRpjrkTQ5pwpBc6G_/view?usp=sharing

I don't own this , if you have issues please contact the owner

Open Source Agenda is not affiliated with "CVE 2020 11932" Project. README Source: ProjectorBUg/CVE-2020-11932
Stars
90
Open Issues
2
Last Commit
4 years ago
License
MIT
Tags

Open Source Agenda Badge

Open Source Agenda Rating