Phantom-Evasion
Phantom-Evasion copied to clipboard
Error generating msf payload windows/x64/exec
[+] MODULE DESCRIPTION:
Inject and execute shellcode
[>] Local process shellcode execution type:
> Thread
> APC
[>] Remote process shellcode execution type:
> ThreadExecutionHijack (TEH)
> Processinject (PI)
> APCSpray (APCS)
> EarlyBird (EB)
> EntryPointHijack (EPH)
[>] Local Memory allocation type:
> Virtual_RWX
> Virtual_RW/RX
> Virtual_RW/RWX
> Heap_RWX
[>] Remote Memory allocation type:
> Virtual_RWX
> Virtual_RW/RX
> Virtual_RW/RWX
> SharedSection
[>] Shellcode Encryption supported
[>] Shellcode can be embedded as resource
[>] AUTOCOMPILE format: exe,dll
Press Enter to continue:
[>] Insert Target architecture (default:x86):x64
[>] Insert shell generation method (default: msfvenom):
[>] Embed shellcode as PE resource? (Y/n):
[>] Insert msfvenom payload (default: windows/x64/meterpreter/reverse_tcp):windows/x64/exec
Traceback (most recent call last):
File "phantom-evasion.py", line 402, in <module>
CompleteMenu()
File "phantom-evasion.py", line 125, in CompleteMenu
Phantom_lib.ModuleLauncher(module_type)
File "Setup/Phantom_lib.py", line 899, in ModuleLauncher
ModOpt=ModuleOpt(M_type)
File "Setup/Phantom_lib.py", line 687, in ModuleOpt
PayloadData=PayloadOpt(M_type,ModOpt["Arch"])
File "Setup/Phantom_lib.py", line 541, in PayloadOpt
payload_advisor(payload_choice,module_choice)
NameError: name 'payload_advisor' is not defined