A CVE-2013-2028 implementation### This is a tool that uses an exploit called [CVE-2013-2028](https://nvd.nist.gov/vuln/detail/CVE-2013-2028) to excecute a [bind shell](https://medium.com/@Proclus/reverse-bind-shells-for-everyoned-e7507853bf4e#5d64) on the target server that's running Nginx 1.3.9 or 1.4.0.
## It can be downloaded [here](https://github.com/jptr218/nginxhack/raw/main/nginxhack.exe) (you will need to run it from the command line)
### Usage:
### `nginxhack [target] [target port] [target bind port] `
[4.0K] /data/pocs/c242f72a7d3cce5c39ead0d4ff6025b9557e5c3e
├── [104K] nginxhack.exe
├── [ 488] README.md
└── [4.0K] src
├── [ 445] hdr.h
├── [2.8K] main.cpp
├── [1.4K] misc.cpp
└── [1.2K] payload.cpp
1 directory, 6 files