Metasploit Payloads Logo

Metasploit Payloads

0
Free
Visit Website

A unified repository for different Metasploit Framework payloads. This is a unified repository for different Metasploit Framework payloads, which merges these repositories: * C Windows Meterpreter * Java and Android Meterpreter * Payloads An alternate cross-platform C Meterpreter, called Mettle, is developed at https://github.com/rapid7/mettle See the individual directories for meterpreter-specific README, build instructions and license details: * C Windows/Linux Meterpreters * Java/Android Meterpreters * Payloads For Python and PHP Meterpreter, you can test changes to these files by symlinking the associated files to ~/.msf4/payloads/meterpreter. As an example, here is how this might look like for a Python Meterpreter: ``` mkdir ~/.msf4/payloads # If this doesn't exist already cd ~/git/metasploit-payloads ln -s /home/gwillcox/git/metasploit-payloads/python/meterpreter/ext_server_stdapi.py /home/gwillcox/.msf4/payloads/meterpreter/ext_server_stdapi.py file ~/.msf4/payloads/meterpreter/ext_server_stdapi.py /home/gwillcox/.msf4/payloads/meterpreter/ext_server_stdapi.py: symbolic link to /home/gwillcox/git/metasploit-payloads/python/meterpreter/ext_server_stdapi.py If things went right, you should now be able to run the meterpreter payload. ```

FEATURES

ALTERNATIVES

Offensive security tool for reconnaissance and information gathering with a wide range of features and future roadmap.

A tool to dump login passwords from Linux desktop users, leveraging cleartext credentials in memory.

A comprehensive malware-analysis tool that utilizes external AV scanners to identify malicious elements in binary files.

A technique for social engineering and untrusted command execution using ClickOnce technology

CobaltBus enables Cobalt Strike C2 traffic via Azure Servicebus for enhanced covert operations.

Pacu is an open-source AWS exploitation framework for offensive security testing against cloud environments.

Inceptor is a template-driven framework for evading Anti-Virus and Endpoint Detection and Response solutions, allowing users to create custom evasion techniques and test their security controls.

A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.