-
Notifications
You must be signed in to change notification settings - Fork 27
Commands
Dayanç Soyadlı edited this page Nov 10, 2018
·
10 revisions
Shows a help menu for listing (reverse shells, techniques, encode types)
creator > show help
Shows :
show reverse_shells # Shows reverse_shells list
show techniques # Shows techniques that you can use with reverse_shells to bypass AV's
show encode_types # Shows Encode Types To Escape AV's
show help # Shows help menu of commands
Sets :
set reverse_shell [powershell, python ..] # Sets Reverse Shell
set LHOST [ip] # Sets Local Host
set LPORT [port] # Sets Local Port
set encode [encode_type] # Sets Encode Type Of Reverse Shell
Others:
run # Creates the encoded reverse_shell file if set options is right
exit # Exits from the script
Shows a list of reverse shells
creator > show reverse_shells
Windows :
powershell # OS : Windows(x86, x64), Type : Command line, File type : *.exe
Linux :
python # OS : Linux(x86, x86_64), Type : Command line, File type : *.py
Both :
java # OS : Windows&Linux (x86_64) Type : Command line, File type : *.jar
Shows a list of techniques that can bypass anti-viruses
creator > show techniques
(0) : Don't want to use any technique
(1) : strstr # Default
(2) : toomuchmem
(3) : increment
Sets enviroments to create reverse shells
Sets :
set reverse_shell [powershell, python ..] # Sets Reverse Shell
set LHOST [ip] # Sets Local Host
set LPORT [port] # Sets Local Port
set encode [encode_type] # Sets Encode Type Of Reverse Shell
Afters sets you can start to create reverse shell with (run) command or you can use (exit) command to exit from tool
Others:
run # Creates the encoded reverse_shell file if set options is right
exit # Exits from the script