HackMate is a Python-based tool that simplifies payload generation and listener management using the Metasploit Framework and msfvenom
. It is designed for cybersecurity professionals and ethical hackers to quickly and efficiently create and manage payloads for various platforms.
- Payload generation for Windows, Linux, Android, MacOS, and Web.
- Staged and Stageless payload options.
- Dynamic LHOST and LPORT configuration.
- Customize payloads with encoder and iterations.
- Automatically start a Metasploit listener.
- Python 3.x
- Metasploit Framework
pyfiglet
andcolorama
libraries
-
Clone the repository:
git clone https://github.com/ysfhmtky/HackMate.git cd HackMate
-
Install the required Python libraries:
pip install pyfiglet colorama
-
Ensure Metasploit Framework is installed:
sudo apt install metasploit-framework
-
Run HackMate:
python HackMate.py
When you start the program, you will see the following menu:
Payload Options:
1. Windows Payloads
2. Linux Payloads
3. Android Payloads
4. MacOS Payloads
5. Web Payloads
6. Staged vs. Stage-less Payloads
0. Exit
- Select the desired payload type (e.g., Windows Payloads).
- Choose the payload (e.g.,
windows/meterpreter/reverse_tcp
). - Enter the LHOST (your IP) and LPORT (your port).
- Specify the output file name (e.g.,
payload.exe
). - Optionally, provide an encoder and iterations.
- The payload will be generated, and a Metasploit listener will start automatically.
To stop the listener and return to the main menu, type exit
.
- Select Windows Payloads.
- Choose
windows/meterpreter/reverse_tcp
. - Enter the LHOST and LPORT values.
- Specify the output file name (e.g.,
payload.exe
). - The payload will be generated, and a listener will start.
- Select Linux Payloads.
- Choose
linux/x86/meterpreter_reverse_tcp
. - Enter the LHOST and LPORT values.
- Specify the output file name (e.g.,
payload.elf
). - The payload will be generated, and a listener will start.
Contributions are welcome! If you'd like to contribute, please fork the repository and create a pull request. Bug fixes and feature suggestions are appreciated.
This project is licensed under the MIT License. See the LICENSE file for more details.
GitHub: ysfhmtky