Skip to content

Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.

Notifications You must be signed in to change notification settings

kkar/MSF-Undetector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 

Repository files navigation

MSF-Undetector

Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions. Use PyInstaller to create the final, single-file binary.

Important notice

For PyInstaller issues when creating a single executable, please take a look at this link. This is NOT MSF-Undetector's issue. You just have to follow some extra steps with PyInstaller.

Requirements

Metasploit framework. May work as expected on Windows, but not tested for now.

Payload support

Currently, only python payloads are supported.

Windows targets supported?

Use PyInstaller, py2exe or any tool of your choice to create a single executable.

Help

=============================================
[ MSF-Undetector - http://github.com/kkar ]
=============================================
usage: msf-undetector.py [-h] [-p PAYLOAD] -a ADDRESS -l LPORT [-o OUTPUT]

optional arguments:
  -h, --help            show this help message and exit
  -p PAYLOAD, --payload PAYLOAD
                        chose your payload (Default:
                        python/meterpreter_reverse_https)
  -a ADDRESS, --address ADDRESS
                        IP/Hostname of metasploit console
  -l LPORT, --lport LPORT
                        msf console listening port
  -o OUTPUT, --output OUTPUT
                        obfuscated filename (Default: output.py)

About

Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages