-
[*] Started reverse TCP handler on 192.168.190.128:4444
[-] 202.91.247.216:6379 - Exploit failed: Msf::Auxiliary::Scanner::AttemptFailed bad-config: Make sure SRVHOST not be 0.0.0.0, or the slav…
-
this is the log: Error: Activity class {org.examples/org.examples.MainActivity} does not exist.
Total time: 1 mins 32.688 secs
Running /Users/cj/Library/Android/sdk/platform-tools/adb -s 895b688…
-
Keypoints:
- Some windows OS doesn't support wget, powershell
- Some windows OS in the target host is 32bit --> so nc64.exe doesn't work
- upload revere shell file to FTP
- [PE] windows server 200…
-
I came across this issue when testing https://github.com/rapid7/metasploit-framework/pull/8355.
By default `EnableStageEncoding` is set to `false`. If you look at the output below, the payload `win…
-
Hi,
Awesome repo. What other payloads can be used with this.
I tried it out in my lab, it works with the python payload however I tried changing the listener as well as the msvenom payload to a…
-
`gawk` already can talk to a network without assistance from external utilities by utilizing special type of files.
From `man`:
```
The following special filenames may be used with the |& coproce…
-
Keypoints:
- [PE] rpc.py -> https://github.com/ehtec/rpcpy-exploit/blob/main/rpcpy-exploit.py
-
Is it possible that changes have been made in windows crate again that the current implementations of process_hollowing and process_migration don't succesfully allow msfvenom payloads to run? The tcp_…
-
Hello:
The linux implants is about 13M, I want to generate stager on linux. I have read the doc and generate the stager on windows successfully,but I dont find any info about linux, how can I reduces…
runt0 updated
4 months ago
-
Bypassing Kaspersky AV on a Win 10 x64 host (TEST CASE)
Getting a shell in a windows 10 machine running fully updated kaspersky AV
Target Machine: Windows 10 x64
Create the payload using msfvenom…