Updates Msfvenom Payload Creator (MPC) v-1.3.2.

Updates Msfvenom Payload Creator (MPC) v-1.3.2.

Msfvenom Payload Creator (MPC) is a wrapper to generate multiple types of payloads, based on users choice. The idea is to be as simple as possible (only requiring one input) to produce their payload.
Fully automating msfvenom & Metasploit is the end goal (well as to be be able to automate MPC itself). The rest is to make the user’s life as easy as possible (e.g. IP selection menu, msfconsole resource file/commands, batch payload production and able to enter any argument in any order (in various formats/patterns)).

Quickly generate Metasploit payloads using msfvenom.

Quickly generate Metasploit payloads using msfvenom.

The only necessary input from the user should be defining the payload they want by either the platform (e.g. windows), or the file extension they wish the payload to have (e.g. exe).
— Can’t remember your IP for a interface? Don’t sweat it, just use the interface name: eth0.
— Don’t know what your external IP is? MPC will discover it: wan.
— Want to generate one of each payload? No issue! Try: loop.
— Want to mass create payloads? Everything? Or to filter your select? ..Either way, its not a problem. Try: batch (for everything), batch msf (for every Meterpreter option), batch staged (for every staged payload), or batch cmd stageless (for every stageless command prompt)!
Latest Change 17/8/2015:
+ Bug fix: Bad IP address when using certain interfaces

To-Do List
+ Shellcode generation
+ x64 payloads
+ IPv6 support
+ Look into using OS scripting more (powershell_bind_tcp & bind_perl etc)

Download : v-1.3.2.zip  | v-1.3.2.tar.gz | Clone url  | Our Post Before
Source : https://github.com/g0tmi1k