Professional Documents
Culture Documents
b6e1e1c3-9be0-4ecc-ada5-c6b54cf60b77
b6e1e1c3-9be0-4ecc-ada5-c6b54cf60b77
b6e1e1c3-9be0-4ecc-ada5-c6b54cf60b77
md
whatsapp_rce
whatsapp remote code execution
CVE-2019-11932 https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/
CVE-2019-11932-SupportApp
This native code file aims to be complementary to the published Whatsapp GIF RCE exploit by
Awakened , by calculating the system() function address and ROP gadget address for different
types of devices, which then can be used to successfully exploit the vulnerability.
Demo
https://drive.google.com/file/d/1T-v5XG8yQuiPojeMpOAG6UGr2TYpocIj/view
#??????????????????????????????????????????????????????????????????????????
About Start.sh Script by KeepWannabe for automated Exploit
WhatsRCE
This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code
Execution)
Auto install GCC (no harm command, you can see this is open-source)
Saving to .GIF file
How To Use ?
sudo apt install git
git clone https://github.com/KeepWannabe/WhatsRCE
cd WhatsRCE && bash start.sh