RDL的堆溢出导致的RCE# CVE-2024-38077-EXP
基于[伪代码](https://sites.google.com/site/zhiniangpeng/blogs/MadLicense)后修复的代码。
# 有效范围
Windows Server 2025
# 使用
```
options:
-h, --help show this help message and exit
--target_ip TARGET_IP
Target IP, eg: 192.168.120.1
--evil_ip EVIL_IP Evil IP, eg: 192.168.120.2
--evil_dll_path EVIL_DLL_PATH
Evil dll path, eg: \smb\evil_dll.dll
--check_vuln_exist CHECK_VULN_EXIST
Check vulnerability exist before exploit
```
# 参考
https://sites.google.com/site/zhiniangpeng/blogs/MadLicense
[4.0K] /data/pocs/40f065e5f0d6b7ce2e91c0fb90e83a5cea3845e5
├── [ 28K] CVE-2024-38077-EXP.py
└── [ 639] README.md
0 directories, 2 files