Vulnerability & Exploit Database

Back to search

Windows Manage Memory Payload Injection Module

This module will inject into the memory of a process a specified windows payload. If a payload or process is not provided one will be created by default using a reverse x86 TCP Meterpreter Payload.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

post/windows/manage/payload_inject

Authors

  • Carlos Perez <carlos_perez [at] darkoperator.com>
  • David Kennedy "ReL1K" <kennedyd013 [at] gmail.com>

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use post/windows/manage/payload_inject msf post(payload_inject) > sessions ...sessions... msf post(payload_inject) > set SESSION <session-id> msf post(payload_inject) > show options ...show and set options... msf post(payload_inject) > run