Skip to content

Ranger11Danger/UnrealIRCd-3.2.8.1-Backdoor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

UnrealIRCd 3.2.8.1 Backdoor

This is a python version of a metasploit module that exploits a known vulnerability in UnrealIRCd 3.2.8.1

I know that this exploit is already well documented and easy to perform with a metasploit module but I wanted to work on my python scripting knowledge, (specifically interacting with sockets in python), and thought this would be a good way to start.

Please let me know where the code could be improved upon, or if there is a completely different way to go about it thats better.

The updated version of this code has the ability to select the type of reverse shell to be sent. Currently there are only 3: python, netcat, and a bash shell, these options are set with -payload. ex. python3 exploit.py 1.1.1.1 6667 -payload python

About

My backdoor script for a vulnerable version of UnrealIRCd

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages