Functions that can be used to gain Reverse Shells with PowerShell
-
Updated
Oct 28, 2020 - PowerShell
{{ message }}
Functions that can be used to gain Reverse Shells with PowerShell
AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
simple reverse shell with elevation to do various tasks that need elevation.
A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decoy app in the foreground while connecting back to the attacker machine as a silent background process , spawning a POWERSHELL on the attacker machine.
A Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.
Attacker can use the scripts to gain reverse shell of a target's machine.
A Java based Fully FUD backdoor Reverse shell for Windows XP,Vista,7,8.x,10, Compiled In Kali Linux with openjdk version "11.0.3" , Compiled to an executable JAR file
reverse shell
A simple reverse shell. It's server is written in JavaScript and the client in Python
Add a description, image, and links to the reverseshell topic page so that developers can more easily learn about it.
To associate your repository with the reverseshell topic, visit your repo's landing page and select "manage topics."