Phantom-Evasion icon indicating copy to clipboard operation
Phantom-Evasion copied to clipboard

Error generating msf payload windows/x64/exec

Open chppppp opened this issue 5 years ago • 0 comments

[+] MODULE DESCRIPTION:

  Inject and execute shellcode 
  [>] Local process shellcode execution type:
   > Thread                            
   > APC                               

  [>] Remote process shellcode execution type:
   > ThreadExecutionHijack       (TEH) 
   > Processinject               (PI)  
   > APCSpray                    (APCS)
   > EarlyBird                   (EB) 
   > EntryPointHijack            (EPH)

  [>] Local Memory allocation type:
   > Virtual_RWX                     
   > Virtual_RW/RX                   
   > Virtual_RW/RWX                  
   > Heap_RWX                        

  [>] Remote Memory allocation type:
   > Virtual_RWX                     
   > Virtual_RW/RX                   
   > Virtual_RW/RWX                  
   > SharedSection                   

  [>] Shellcode Encryption supported 
  [>] Shellcode can be embedded as resource
  [>] AUTOCOMPILE format: exe,dll 


  Press Enter to continue: 

[>] Insert Target architecture (default:x86):x64

[>] Insert shell generation method (default: msfvenom):

[>] Embed shellcode as PE resource? (Y/n): 

[>] Insert msfvenom payload (default: windows/x64/meterpreter/reverse_tcp):windows/x64/exec
Traceback (most recent call last):
  File "phantom-evasion.py", line 402, in <module>
    CompleteMenu()
  File "phantom-evasion.py", line 125, in CompleteMenu
    Phantom_lib.ModuleLauncher(module_type)
  File "Setup/Phantom_lib.py", line 899, in ModuleLauncher
    ModOpt=ModuleOpt(M_type)
  File "Setup/Phantom_lib.py", line 687, in ModuleOpt
    PayloadData=PayloadOpt(M_type,ModOpt["Arch"])
  File "Setup/Phantom_lib.py", line 541, in PayloadOpt
    payload_advisor(payload_choice,module_choice)
NameError: name 'payload_advisor' is not defined

chppppp avatar Mar 06 '20 18:03 chppppp