A simple script to exploit imagetragick vulnerability to gain remote code execution
Ensure you have portforwarded to receive connections
python2.7 is been setted up as system path
Tested on mac and ubuntu
###Usage ./imagik.py
$ python imagik.py
1.)Execute the py script
2.)Now give the (Public Ip) to connect back
3.)netcat will be waiting for reverse shell at port 4444
3.)Upload the .mvg file to the website you are testing
5.)If site is vulnerable to the attack you will get the reverse shell via terminal
.......