Social-Engineer-Toolkit-SET/Social-Engineering-Attacks/Create-Payload-and-Listener
Jump to navigation
Jump to search
You are here: | Create a Payload and Listener
|
- Windows Shell Reverse_TCP (Spawn a command shell on victim and send back to attacker)
- Windows Reverse_TCP Meterpreter (Spawn a meterpreter shell on victim and send back to attacker)
- Windows Reverse_TCP VNC DLL (Spawn a VNC server on victim and send back to attacker)
- Windows Bind Shell (Execute payload and create an accepting port on remote system)
- Windows Bind Shell X64 (Windows x64 Command Shell, Bind TCP Inline)
- Windows Shell Reverse_TCP X64 (Windows X64 Command Shell, Reverse TCP Inline)
- Windows Meterpreter Reverse_TCP X64 (Connect back to the attacker (Windows x64), Meterpreter)
- Windows Meterpreter Egress Buster (Spawn a meterpreter shell and find a port home via multiple ports)
- Windows Meterpreter Reverse HTTPS (Tunnel communication over HTTP using SSL and use Meterpreter)
- Windows Meterpreter Reverse DNS (Use a hostname instead of an IP address and spawn Meterpreter)
- SE Toolkit Interactive Shell (Custom interactive reverse toolkit designed for SET)
- SE Toolkit HTTP Reverse Shell (Purely native HTTP shell with AES encryption support)
- RATTE HTTP Tunneling Payload (Security bypass payload that will tunnel all comms over HTTP)
- ShellCodeExec Alphanum Shellcode (This will drop a meterpreter payload through shellcodeexec (A/V Safe))
- Import your own executable (Specify a path for your own executable)