Advertisement
TVT618

mkvenom - A simple Bash script to create msfvenom payloads

Aug 14th, 2018
131
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.15 KB | None | 0 0
  1. About mkvenom.sh:
  2. * 🐍 mkvenom.sh is a Bash script which generates a selection of common Metasploit Framework msfvenom payloads for a specific target machine.
  3. * The idea is to kick this off in the background while performing initial scanning and enumeration of a target during a penetration test activity to speed up your testing workflow (see also: ptboot). It's slow and it's imprecise, but in some circumstances it can be a good time saving tool.
  4.  
  5. Features:
  6. This script will create commonly used Metasploit Framework payloads such as reverse meterpreter shells, bind shells etc., including 32-bit/64-bit and staged/inline variants.
  7.  
  8. It will produce a directory called payloads which will contain a library of ready to use payload files built using the local and remote TCP/IP parameters specified via the command line:
  9.  
  10. Requirements:
  11. The only requirements are the presence of Metasploit Framework 4.16+ and the Bash shell.
  12. This script is intended for use in a Linux environment and has been tested on Kali Linux 2018.3 and ParrotSec 4.1.
  13.  
  14. Install and run:
  15. sudo apt update && apt install metasploit-framework
  16. git clone https://github.com/phraxoid/mkvenom
  17. cd mkvenom
  18. sudo bash mkvenom.sh
  19.  
  20. Usage:
  21. Clone or download the mkvenom.sh file from this repository in to your Linux environment. You might want to consider placing it in ~/bin or /usr/local/bin.
  22.  
  23. A directory called payloads will be created in the current working directory when the script runs.
  24.  
  25. Command line usage syntax:
  26.  
  27. For example, if the local penetration tester's system has an IP address of 192.168.10.200 and a remote Linux target system has an IP address of 10.20.20.1:
  28. /usr/local/bin/mkvenom.sh 10.20.20.1 4444 192.168.10.200 443 linux
  29.  
  30. In the above example, payloads which bind to an address on the target would use port 4444 whilst payloads which make reverse connections back to the local machine would use port 443.
  31.  
  32. License: This software is published here under the MIT licence.
  33.  
  34. Disclaimer: This software is provided "as is" without any representations or warranties, express or implied.
  35.  
  36. Download mkvenom: https://github.com/phraxoid/mkvenom
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement