PoC Exploit for Microsoft Exchange Launche

Original PoC:
How to use:

python <name or IP of server> <user@fqdn>

python primary administrator@lab.local

If successful you will be dropped into a webshell. exit or quit to escape from the webshell (or ctrl+c)

By default, it will create a file test.aspx. This can be changed.Special Thanks and resources:

@Flangvik @Testanull

Download ProxyLogon


This is only an educational purposes only I am not responsible for further activities

Join my forum and learn more ethical hacking and penetration testing

Get me at


Leave a Reply

Your email address will not be published. Required fields are marked *