Share
## https://sploitus.com/exploit?id=A59B5F6D-2953-50CE-BF0B-3004CD04BDED
> Warning: This vulnerability's remote code execution exploit is potentially volatile!

# ๐Ÿš€ Windows TCP/IP Remote Code Execution Vulnerability CVE-2024-38063 Packet Sender

๐ŸŽญ Are you ready to unleash chaos in a controlled environment? Look no further! This program is your ticket to sending custom-crafted IPv6 packets and exploiting the [Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063)](https://nvd.nist.gov/vuln/detail/CVE-2024-38063). It's like sending a digital love letter, but instead of poetry, you're sending panic! ๐Ÿ’Œ๐Ÿ’ฅ

**๐Ÿšจ Important Note:** This tool is for educational purposes only. Using it without permission is like borrowing your neighbor's Wi-Fi without asking - illegal, unethical, and bound to make family barbecues awkward. ๐Ÿ˜ฌ

## ๐ŸŽ‰ Features

- Sends custom IPv6 packets faster than you can say "oops!"
- Reads payload data from `shellcode.txt` (because typing it manually is so 2023)
- Configurable network interface and target address (for when you want to be precise about your chaos)

## ๐Ÿ› ๏ธ Prerequisites

- **Operating System**: Unix-like systems (Linux). Sorry Windows users, the irony is not lost on us! ๐Ÿคทโ€โ™‚๏ธ (to add Windows programmer code)
- **Privileges**: Root access required. Time to dust off that sudo password!
- **Dependencies**: GCC or another C compiler. Because we're old school cool. 'scapy' python module ๐Ÿ˜Ž

## ๐Ÿ—๏ธ Setup

1. **Clone the Repository**:
   ```bash
   git clone <repository_url>
   cd <repository_directory>
   ```
   Welcome to the danger zone! ๐ŸŽต

2. **Prepare the Payload**:
   Create `shellcode.txt` in the same directory. Fill it with raw binary shellcode. It's like stuffing a digital piรฑata! ๐Ÿช…

3. **Compile the Program(There is a problem with the C language version, trying to update and modify)**: 
   ```bash
   gcc -o ipv6_packet_sender ipv6_packet_sender.c -Wall
   ```
   Congratulations! You've just created a digital grenade! ๐Ÿ’ฃ

## ๐ŸŽฎ Usage (Python)

### Command-line Arguments

```bash
sudo file [-h] [-i INTERFACE] [-a ADDRESS] [-m MAC] [-t TRIES] [-b BATCHES] [-c SHELLCODE]
```
It's like a game of digital hot potato! ๐Ÿฅ”

### Example

```bash
sudo <file> -i wlan0 -a ::1 -m AA:BB:CC:DD:EE:FF -t 10 -b 10 
```
Replace with your target's details. No, your ex's IP address doesn't count! ๐Ÿ™…โ€โ™‚๏ธ

### Output

Watch as the program sends packets and displays a countdown timer. It's like New Year's Eve, but for hackers! ๐ŸŽ†

## โš ๏ธ Important Notes

- **Root Privileges**: We need the big guns for this one. Sudo me, baby! ๐Ÿ’ช
- **Promiscuous Mode**: Your network card is about to see things it can't unsee. ๐Ÿ‘€
- **Ethical Usage**: Don't be that guy at the party. Get permission before you start poking around! ๐ŸŽญ

## Scan local intranet devices
```bash
sudo nmap -6 -sn -T4 --min-rate=1000 [The 'ip -6 addr show' command can be used to obtain]

```

## ๐Ÿ”ง Troubleshooting

- **Permission Denied**: Did you forget the magic word? (It's "sudo") ๐Ÿง™โ€โ™‚๏ธ
- **Compilation Errors**: Time to update your C game. It's not just for history books! ๐Ÿ“š
- **Payload File Issues**: Make sure `shellcode.txt` exists and isn't just full of your grocery list. ๐Ÿ›’

## ๐Ÿ“œ License

This project is licensed under the MIT License. See the LICENSE file for more details. It's like a prenup for your code! ๐Ÿ’

## ๐ŸŽญ Disclaimer

Remember, with great power comes great responsibility. And potential jail time if misused. So let's keep it legal and ethical, folks! ๐Ÿฆธโ€โ™‚๏ธ๐Ÿฆธโ€โ™€๏ธ

Now go forth and exploit responsibly! May your packets fly true and your exploits be mighty! ๐Ÿš€๐ŸŽฏ


# Windows Version(Under development...)

## APT Install
```sudo apt-get install mingw-w64```
 
## Recommended instructions for cross-compilation 
```i686-w64-mingw32-gcc main_WindowsVersion.c -o program.exe -lws2_32 -liphlpapi```