Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/err0r-ica/whatspayloadrce
Whatsapp Automatic Payload Generator [CVE-2019-11932]
https://github.com/err0r-ica/whatspayloadrce
cve exploit hacking hacking-tools linux payload termux whatsapp whatsapp-chat
Last synced: 3 months ago
JSON representation
Whatsapp Automatic Payload Generator [CVE-2019-11932]
- Host: GitHub
- URL: https://github.com/err0r-ica/whatspayloadrce
- Owner: Err0r-ICA
- Created: 2020-04-22T21:11:27.000Z (almost 5 years ago)
- Default Branch: master
- Last Pushed: 2022-01-02T20:40:58.000Z (about 3 years ago)
- Last Synced: 2024-10-01T07:41:16.590Z (4 months ago)
- Topics: cve, exploit, hacking, hacking-tools, linux, payload, termux, whatsapp, whatsapp-chat
- Language: C
- Homepage:
- Size: 25.4 KB
- Stars: 31
- Watchers: 2
- Forks: 10
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# WhatsPayloadRCE
This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)
1. Auto install GCC (no harm command, you can see this is open-source)
2. Saving to **.GIF** file## How To Use ?
```
sudo apt install git
git clone https://github.com/Err0r-ICA/WhatsPayloadRCE
cd WhatsPayloadRCE && bash start
```## Screenshot
![Screenshot](https://i.postimg.cc/L9yF7dkb/Screenshot-20200422-225622-Termux.jpg)## How Get Shell ?
1. You just send the **.GIF** file to victim user **AS A DOCUMENT NOT IMAGES**
2. And set the nc / netcat to port you set on the WhatsRCE tools {**nc -lnvp your_port**}
3. You can use the Social Engineering attack so that victims can be attracted to launch this exploit
4. Tell the victim to open the gallery via whatsapp and send the victim to send any phot.os After that a few seconds later you will receive a shell connection from the victim## How To Avoid This Attack?
1. Update your whatsapp to the latest version **(Patched on Version 2.19.244)**
2. How to receive any file including audio images and others from people we don't know### Thanks to [awakened1712](https://awakened1712.github.io/) - [Edo Maland](https://github.com/Screetsec/) - [IndoXploit](https://indoxploit.or.id)
#### **This is only for learning, consequences etc. if you use it for a crime I am not responsible!**
### My Accounts
* [TELEGRAM](https://t.me/termuxxhacking)
* [FACEBOOK](https://www.facebook.com/termuxxhacking)
* [INSTAGRAM](https://instagram.com/termux_hacking)
[![Build-passing](https://img.shields.io/badge/build-passing-red.svg?style=plastic)](https://github.com/Err0r-ICA/SpeedTest/issues) [![Stars](https://img.shields.io/open-vsx/stars/Redhat/Java.svg?style=plastic&color=orange)](https://github.com/Err0r-ICA/SpeedTest/issues) [![Coverage](https://img.shields.io/azure-devops/coverage/Swellaby/Opensource/25?color=yellow&style=plastic)](https://github.com/Err0r-ICA/SpeedTest/issues)
[![Maintainers](https://img.shields.io/badge/mainteiners-HackBoyz-green.svg?style=plastic)](https://github.com/Err0r-ICA/SpeedTest/issues) [![coded](https://img.shields.io/badge/coded%20in-bash-mintgreen.svg?style=plastic)](https://github.com/Err0r-ICA/SpeedTest/issues)
[![Status](https://img.shields.io/badge/code%20status-encrypted-cyan.svg?style=plastic)](https://github.com/Err0r-ICA/SpeedTest/issues) [![License](https://img.shields.io/badge/license-MIT-blueviolet.svg?style=plastic)](https://github.com/Err0r-ICA/SpeedTest/issues)
[![Test](https://img.shields.io/badge/tested%20on-Termux,%20Kali%20Linux,%20Ubuntu,%20Parrot%20OS,%20Debian,%20ANDRAX%20Mobile-%23ff69b4.svg?style=plastic)](https://github.com/Err0r-ICA/SpeedTest/issues)