# Description 
As part of my cybersecurity thesis I wanted to create an exploit for a vulnerability.

I HIGHLY recommend reading this guide, as this exploit is based on it:

Also, check out this repo, as i took inspiration from it:

This code is by no means perfect, sometimes it gets a bit buggy if you set a password for the new user.

I recommend NOT setting a password.

If it does not create a new user, simply retry a few times and it will eventually work.

if you have any advices on how to improve this code, please, feel free to share them :) !

# Disclaimer

The tools and exploits provided in this repository are released for educational and research purposes only. 

The author is not responsible for any misuse or damage that may be caused by the tools or exploits. 

Users are strongly encouraged to use these resources responsibly and ethically, adhering to applicable laws and regulations. 

The author supports ethical hacking and responsible disclosure, and strongly discourages malicious use of these resources.

By using this repository, you agree that you understand the contents of this disclaimer and that you will comply with the terms and conditions outlined.