
SCAREDYCAT! version 0.1 beta released.
Python script to generate a malicious MP4 file and start a web server hosting a page with the embedded ‘video’ file on port 8080. This exploits another Stagefright vulnerability, the integer overflow vulnerability (CVE-2015-3864), published by Exodus Intelligence.
Optional Arguments:
1 2 3 4 5 6 7 |
libcfile path to libc.so file (usually in /system/lib on android devices). one is included in the repo. -h, --help show this help message and exit -p PAYLOAD, --payload PAYLOAD path to shellcode/payload to be injected into mp4 file. a generic one created by meterpreter is included. -v, --version version information |
Installation:
1 2 3 |
git clone https://github.com/eudemonics/scaredycat cd scaredycat python scaredycat -h |