Files
metasploit-gs/lib/msf/core/payload/python.rb
T
2025-05-30 09:06:20 -04:00

26 lines
888 B
Ruby

# -*- coding: binary -*-
module Msf::Payload::Python
#
# Encode the given python command in base64 and wrap it with a stub
# that will decode and execute it on the fly. The code will be condensed to
# one line and compatible with all Python versions supported by the Python
# Meterpreter stage.
#
# @param python_code [String] The python code to execute.
# @return [String] Full python stub to execute the command.
#
def self.create_exec_stub(python_code)
# Encoding is required in order to handle Python's formatting
payload = Rex::Text.encode_base64(Rex::Text.zlib_deflate(python_code))
b64_stub = "exec(__import__('zlib').decompress(__import__('base64').b64decode(__import__('codecs').getencoder('utf-8')('#{payload}')[0])))"
b64_stub
end
def py_create_exec_stub(python_code)
Msf::Payload::Python.create_exec_stub(python_code)
end
end