
如何在Python中使用subprocess准备shell执行环境
1个回答
展开全部
#! /usr/bin/env python
# -*- coding: utf-8 -*-
"""
TO generate random shellcode samples from msfvenom
command ="msfvenom -p linux/x86/shell/reverse_tcp -e x86/shikata_ga_nai -f raw"
"""
import random
from info import *
import uuid
import os
import subprocess
import sys
os.chdir('/opt/metasploit-framework/')
count = int(sys.argv[1])
while (count > 0):
count -= 1
e = encoders[random.randint(0, len(encoders)-1)]
payloads = linux_x86_shellcodes + windows_x86_shellcodes
p = payloads[random.randint(0, len(payloads)-1)]
command ="./msfvenom -p {0} -e {1} -f raw > /var/tmp/data/".format(p, e) + str(uuid.uuid4())
subprocess.Popen("source /usr/local/rvm/scripts/rvm;"+ command, shell=True, executable='/bin/bash')
请采纳
# -*- coding: utf-8 -*-
"""
TO generate random shellcode samples from msfvenom
command ="msfvenom -p linux/x86/shell/reverse_tcp -e x86/shikata_ga_nai -f raw"
"""
import random
from info import *
import uuid
import os
import subprocess
import sys
os.chdir('/opt/metasploit-framework/')
count = int(sys.argv[1])
while (count > 0):
count -= 1
e = encoders[random.randint(0, len(encoders)-1)]
payloads = linux_x86_shellcodes + windows_x86_shellcodes
p = payloads[random.randint(0, len(payloads)-1)]
command ="./msfvenom -p {0} -e {1} -f raw > /var/tmp/data/".format(p, e) + str(uuid.uuid4())
subprocess.Popen("source /usr/local/rvm/scripts/rvm;"+ command, shell=True, executable='/bin/bash')
请采纳
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询
广告 您可能关注的内容 |