def __init__(self): PythonPayload.__init__(self) # required options self.description = "Auxiliary pyinstaller wrapper for python source files" self.language = "python" self.rating = "Normal" self.extension = "py" self.required_options["python_source"] = ["", "Python source file to compile with pyinstaller"]
def __init__(self): PythonPayload.__init__(self) # required options self.description = "pure windows/meterpreter/bind_tcp stager, no shellcode" self.rating = "Excellent" # optional # options we require user interaction for- format is {Option : [Value, Description]]} self.required_options["RHOST"] = ["", "The listen target address"] self.required_options["LPORT"] = ["4444", "The listen port"]
def __init__(self): PythonPayload.__init__(self) # required options self.description = "pure windows/meterpreter/reverse_tcp stager, no shellcode" self.rating = "Excellent" # optional # options we require user interaction for- format is {Option : [Value, Description]]} self.required_options["LHOST"] = ["", "IP of the metasploit handler"] self.required_options["LPORT"] = ["4444", "Port of the metasploit handler"] self.required_options["expire_payload"] = ["X", "Optional: Payloads expire after \"X\" days"]
def __init__(self): PythonPayload.__init__(self) self.description = "Injects shellcode, then tunnels over ssh" self.rating = "Excellent" self.shellcode = shellcode.Shellcode() self.required_options['SSH_IP'] = ["", "IP of your SSH server"] self.required_options['SSH_PORT'] = ["22", "Port of your SSH server"] self.required_options['SSH_USER'] = ["", "Username"] self.required_options['SSH_PASS'] = ["", "Password"] self.required_options['BIND_PORT'] = ["8021", "Meterpreter bind port"]
def __init__(self): # pull in shared options PythonPayload.__init__(self) # required options self.description = "Auxiliary pyinstaller wrapper for python source files" self.language = "python" self.rating = "Normal" self.extension = "py" self.required_options = { "PYTHON_SOURCE" : ["", "A Python source file to compile with pyinstaller"] # /path/to/any/python/file.py } self.required_options.update(self.required_python_options)
def __init__(self): PythonPayload.__init__(self) # required options self.description = "pure windows/meterpreter/reverse_tcp stager, no shellcode" self.rating = "Excellent" # optional # options we require user interaction for- format is {Option : [Value, Description]]} self.required_options["LHOST"] = ["", "IP of the metasploit handler"] self.required_options["LPORT"] = [ "4444", "Port of the metasploit handler" ] self.required_options["expire_payload"] = [ "X", "Optional: Payloads expire after \"X\" days" ]
def __init__(self): # pull in shared options PythonPayload.__init__(self) # required options self.description = "pure windows/meterpreter/bind_tcp stager, no shellcode" self.rating = "Excellent" # optional # options we require user interaction for- format is {OPTION : [Value, Description]]} self.required_options = { "LHOST" : ["", "The listen target address"], "LPORT" : ["4444", "The listen port"], } self.required_options.update(self.required_python_options)
def __init__(self): # pull in shared options PythonPayload.__init__(self) # required options self.description = "pure windows/meterpreter/reverse_tcp stager, no shellcode" self.rating = "Excellent" # optional # options we require user interaction for- format is {OPTION : [Value, Description]]} self.required_options = { "EXPIRE_PAYLOAD" : ["X", "Optional: Payloads expire after \"Y\" days (\"X\" disables feature)"], "LHOST" : ["", "IP of the Metasploit handler"], "LPORT" : ["4444", "Port of the Metasploit handler"], } self.required_options.update(self.required_python_options)
def __init__(self): # pull in shared options PythonPayload.__init__(self) # required options self.description = "pure windows/meterpreter/reverse_tcp stager, no shellcode" self.rating = "Excellent" # optional # options we require user interaction for- format is {OPTION : [Value, Description]]} self.required_options = { "EXPIRE_PAYLOAD": [ "X", "Optional: Payloads expire after \"Y\" days (\"X\" disables feature)" ], "LHOST": ["", "IP of the Metasploit handler"], "LPORT": ["4444", "Port of the Metasploit handler"], } self.required_options.update(self.required_python_options)