Jump to content

Search the Community

Showing results for tags 'shell'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

  1. Description The beauty of script programming is in its ability to automate mundane developing tasks. Whether you’re interested in learning command line automation for Mac, Linux, and Unix, or need a complete introduction to bash shell scripting, This unique course is designed to become an expert in bash shell scripting to automate repetitive tasks. It’s project-based, which means instead of learning bits and pieces of information, you’ll write actual shell scripts that you can use in real-world situations. You get the chance to immediately put what you learn to use so that you fully understand and remember it. As we know that most of the organizations are moving into Linux and Unix operating system as its generally open source. Additionally, Linux, Unix skills gained by developers would make them more in demand. From a developer perspective, this course not only cover command line commands, but also Bash shell scripting to make you comprehensive developer expert in Linux \ Unix OS. The topic covered are as follows: How to write shell scripts from basic to advanced level What is the shebang line and why every shell script need ones. How to create and use variables Testing and Decision Making Command line arguments Input and output Conditional Statements Exit status filters like grep, awk, cut and sed Functions Wildcards Loops Case statements Logging Debugging tips Bash Shell Options Working with remote servers Practice on each topic Happy learning!! Who this course is for: Anyone who has a good knowledge of Linux or Unix and wants to learn shell scripting Anyone who wants to level up his or her career in Linux field Anyone who wants to improve Linux skills Administrators who are looking to automate their regular tedious tasks Requirements Desire to learn shell scripting Linux machine either running on a physical or virtual machine Familiarity with Linux command line [Hidden Content] [hide][Hidden Content]]
  2. Master Reverseshell attacks Course Duration: 5 sections • 28 lectures • 4h 4m total length What you'll learn: Master Reverse Shell Attacks Pracice Windows Reverse Shell Attacks Build your own cybersecurity lab Pracrice linux reverse shell attacks Master variety of reverse shell attacks tools Requirements: No requirement or Prerequistes this course for Absolute Beginners Description: Reverse shell attacks are one of the most famous and dangerous attacks because they can bypass security controls and they can take full control of the target device. The reverse shell attack's main goal is to make the connection come back from the victim's device and then take full control of the victim's device. In this course, we assume that you never did any kind of reverse shell attacks before, so we will start from scratch. We will start talking about reverse shell attacks in general and then we will build the necessary ethical hacking lab to practice reverse shell attacks in safe and legal environments. Then, we will learn together some essential system commands. However, you can skip this section if already know Linux commands. After that, we will start practicing the following:1-Build your cyber security lab - Download and Install VirtualBox -Download and Install Vmware - Download and Install Kali Linux - Take a look on Kali Linux - Download and Install Metasploitabl - Download and Install Windows 10 VM.2- learn some networks basics -what is IP Address? - what is Mac Address? -what is port number? - what is DNS? -what is DHCP? - What is NAT?3-Essential System Commnads4-Practice Reverse shell attacks - Bind shell attacks - Reverse TCP attacks -Reverse HTTPS attacks - Linux and Android payload for reverse attacks - Windows Reverse shell attacks using MSFPC - MSFPC for Android payload - MSFPC for Linux payload - USING Netcat fro reverse shell attacks.Also, you will learn a lots about reverse shell attacks in practical way.The best way to study for this course is to watch the lesson first and then go ahead and practice it. If you face any difficulty please contact me and I will be more than happy to help. Who this course is for: Anyone wants to learn and master reverse shell attacks by doing them [Hidden Content] [hide][Hidden Content]]
  3. Want to use SSH for reverse shells? Now you can. Manage and connect to reverse shells with native SSH syntax Dynamic, local, and remote forwarding Native SCP and SFTP implementations for retrieving files from your targets Full windows shell Mutual client & server authentication to create high trust control channels And more! [hide][Hidden Content]]
  4. Reverse SSH Want to use SSH for reverse shells? Now you can. Manage and connect to reverse shells with native SSH syntax Dynamic, local, and remote forwarding Native SCP and SFTP implementations for retrieving files from your targets Full windows shell Mutual client & server authentication to create high trust control channels And more! [hide][Hidden Content]]
  5. A flexible and scalable cross-plaform shell generator tool. A simple yet flexible cross-platform shell generator tool. Name: G(Great) Shell Description: A cross-platform shell generator tool that lets you generate whichever shell you want, in any system you want, giving you full control and automation. Supports the following languages and tools: PowerShell Python Bash Sh Perl Socat Netcat Nc Awk Lua NodeJS OpenSSL PHP Ruby Telnet Golang C# Dart Groovy Many more... [hide][Hidden Content]]
  6. WordPress webshell plugin for RCE A webshell plugin and interactive shell for pentesting a WordPress website. Features Webshell plugin for WordPress. Execute system commands via an API with ?action=exec. Download files from the remote system to your attacking machine with ?action=download. [hide][Hidden Content]]
  7. FOR : Hiding attacker IP in reverse shell (No direct interaction between attacker and target machine. Notion is used as a proxy hosting the reverse shell) Demo/Quick proof insertion within report High available and shareable reverse shell (desktop, browser, mobile) Encrypted and authenticated remote shell NOT FOR : Long and interactive shell session (see tacos for that) [hide][Hidden Content]]
  8. Powerful manager for Windows File Explorer context menu Overview Shell is a context menu extender that lets you handpick the items to integrate into Windows File Explorer context menu, create custom commands to access all your favorite web pages, files, and folders, and launch any application directly from the context menu. It also provides you a convenient solution to modify or remove any context menu item added by the system or third party software. Shell is a portable utility, so you don’t need to install anything on your PC. Features Lightweight, portable and relatively easy to use. Fully customize the appearance. Adding new custom items such as (sub-menu, menuitem and separator). Modify or remove items that already exist. Support all file system objects files, folders, desktop and taskbar. Support expressions syntax. with built-in functions and predefined variables. Support colors, glyphs, SVG, embedded icons, and image files such as .ico, .png or .bmp. Support search and filter. Support for complex nested menus. Support multiple column. Quickly and easily configure file in plain text. Minimal resource usage. No limitations. Requirements Microsoft Windows 7/8/10/11 [hide][Hidden Content]]
  9. What is tornado? Tornado is implements tor network with metasploit-framework tool and msfvenom module, you can easily create hidden services for your localhost .onion domain without portforwarding. If you have experience different remote administration tools, probably you know you need forward port with virtual private network or ngrok but in this sense with tornado, the tor network offers the possibility of making services in a machine accessible as hidden services without portforwarding, by taking advantage of the anonymity it offers and thereby preventing the real location of the machine from being exposed. tornado can do create hidden service with tor network generate cross platform msfvenom payload with fully undetectable shellcode execution not shikata_ga_nai things hidden service becomes available outside tor network and ready to reverse shell connection be careful with tor2web even onion network, the only suicide mission is wearing blinders. tornado not secure from victim's point of view: the point of tor is that users can connect without being eavesdropped on and going through the clearnet with tor2web, even with https seriously cripples the efforts made to protect users. Disclaimer This tool is only for testing and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. I assume no liability and are not responsible for any misuse or damage caused by this tool and software. [hide][Hidden Content]]
  10. itsMe

    Indosec Shell

    [hide][Hidden Content]]
  11. itsMe

    Zeerx7 Shell

    [hide][Hidden Content]]
  12. Anonymously Reverse shell over Tor Network using Hidden Services without port forwarding. This project implements the tor network with the metasploit-framework tool and msfvenom module. You can easily create hidden services for your LHOST .onion domain without portforwarding. If you have experienced different remote administration tools, probably you know you need a forward port with VPN or NGROK but in this sense, the Tor network offers the possibility of making services in a machine accessible as hidden services without portforwarding, by taking advantage of the anonymity it offers and thereby preventing the real location of the machine from being exposed. Currently, this project has that features. Create a hidden service Generate msfvenom payload with fully undetectable Hidden service becomes available outside tor network Disclaimer This tool is only for testing and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. I assume no liability and are not responsible for any misuse or damage caused by this tool and software. [hide][Hidden Content]]
  13. LAZYPARIAH is a simple and easily installable command-line tool written in pure Ruby that can be used during penetration tests and capture-the-flag (CTF) competitions to generate a range of reverse shell payloads on the fly. The reverse shell payloads that LAZYPARIAH supports include (but are not limited to): C binary payloads (compiled on the fly): c_binary Ruby payloads: ruby, ruby_b64, ruby_hex, ruby_c Powershell payloads: powershell_c, powershell_b64 Base64-encoded Python payloads: python_b64 Rust binary payloads (compiled on the fly): rust_binary PHP scripts containing base64-encoded Python payloads called via the system() function: php_system_python_b64 Java classes (compiled on the fly): java_class Perl payloads: perl, perl_b64, perl_hex, perl_c Simple PHP payloads (targeting specific file descriptors): php_fd, php_fd_c, php_fd_tags Dependencies Ruby >= 2.7.1 (LAZYPARIAH has not been tested on previous versions of Ruby) OpenJDK (Optional: Only required for java_class payloads.) GCC (Optional: Only required for c_binary payloads.) Rust (Optional: Only required for rust_binary payloads.) [hide][Hidden Content]]
  14. Description Linux is a powerful and widely used operating system, it is free and open source software. It can run on wide range of hardware platforms like desktops, servers, mobile devices and even supercomputers. Most of the top companies in the world use Linux servers. Linux is growing very rapidly and demand for Linux talent is on the rise. So acquiring Linux skills can help you land a job and get ahead in your career. This tutorial is designed for computer users who have limited or no previous knowledge of Linux. If you are complete beginner in Linux or have never worked on command line, then this course is for you. In this course you’ll learn Linux from scratch. Learn to Program Using Any Shell What you learn in this course can be applied to any shell, however the focus is on the bash shell and you’ll learn some really advanced bash features. Again, whether you’re using bash, bourne (sh), KornShell (ksh), C shell (csh), Z shell (zsh), or even the tcsh shell, you’ll be able to put what you learn in this course to good use. Perfect for Linux, Unix, Mac and More! Also, you’ll be able to use these scripts on any Linux environment including Ubuntu, Debian, Linux Mint, RedHat, Fedora, OpenSUSE, Slackware, Kali Linux and more. You’re scripts will even run on other operating systems such as Apple’s Mac OS X, Oracle’s Solaris, IBM’s AIX, HP’s HP-UX, FreeBSD, NetBSD, and OpenBSD. (Sorry, this course is NOT for Windows scripting or powershell scripting.) Become an effective Linux user and advance your Career. Learning the Linux Command Line will take you FAR! Learn to appreciate the power of the Linux command line. Understand the structure of the Linux File System. Learn how to utilize Linux man pages and help tools. Realize the differences between soft and hard links. Learn how to navigate your Linux File System using few simple commands! Learn how to create, modify and process files. Learn how to create your own Linux commands. Who this course is for: Anyone interested in shell scripting or shell programming. Anyone who wants to get started with Linux. Existing Linux users or learners who wants to be effective at using the Linux command Line. Aspiring Linux system administrators. Requirements No experience required [Hidden Content] [hide][Hidden Content]]
  15. A modern multiple reverse shell sessions/clients manager via terminal written in go Features Multiple service listening port Multiple client connections RESTful API Python SDK Reverse shell as a service (Pop a reverse shell in multiple languages without remembering idle commands) Download/Upload file with progress bar Full interactive shell Using vim gracefully in reverse shell Using CTRL+C and CTRL+Z in reverse shell Start servers automatically Port forwarding Initialize from configuration file Web UI v1.5.0 Latest **Notice** This temite version is INCOMPATIBLE with earlier versions (v1.4.*) But, the termite would be able to upgrade itself automatically from now on. **New features** 1. Support shell execution in termite 2. Support file reading and writing in termite 3. Support termite upgrading automatically 4. Redesign opcodes in termite protocol **Bug fix** 1. Fix termite double connection [hide][Hidden Content]]
  16. A simple shellcode encryptor/decryptor/executor to bypass anti-virus. [hide][Hidden Content]]
  17. A small reverse shell for Linux & Windows. Features Windows Usage: └ Shared Commands: !exit !upload <src> <dst> * uploads a file to the target !download <src> <dst> * downloads a file from the target !lfwd <localport> <remoteaddr> <remoteport> * local portforwarding (like ssh -L) !rfwd <remoteport> <localaddr> <localport> * remote portforwarding (like ssh -R) !lsfwd * lists active forwards !rmfwd <index> * removes forward by index !plugins * lists available plugins !plugin <plugin> * execute a plugin !spawn <port> * spawns another client on the specified port !shell * runs /bin/sh !runas <username> <password> <domain> * restart xc with the specified user !met <port> * connects to a x64/meterpreter/reverse_tcp listener └ OS Specific Commands: !powershell * starts powershell with AMSI Bypass !rc <port> * connects to a local bind shell and restarts this client over it !runasps <username> <password> <domain> * restart xc with the specified user using powershell !vulns * checks for common vulnerabilities Linux Usage: └ Shared Commands: !exit !upload <src> <dst> * uploads a file to the target !download <src> <dst> * downloads a file from the target !lfwd <localport> <remoteaddr> <remoteport> * local portforwarding (like ssh -L) !rfwd <remoteport> <localaddr> <localport> * remote portforwarding (like ssh -R) !lsfwd * lists active forwards !rmfwd <index> * removes forward by index !plugins * lists available plugins !plugin <plugin> * execute a plugin !spawn <port> * spawns another client on the specified port !shell * runs /bin/sh !runas <username> <password> <domain> * restart xc with the specified user !met <port> * connects to a x64/meterpreter/reverse_tcp listener └ OS Specific Commands: !ssh <port> * starts sshd with the configured keys on the specified port [hide][Hidden Content]]
  18. Features Windows Usage: └ Shared Commands: !exit !upload <src> <dst> * uploads a file to the target !download <src> <dst> * downloads a file from the target !lfwd <localport> <remoteaddr> <remoteport> * local portforwarding (like ssh -L) !rfwd <remoteport> <localaddr> <localport> * remote portforwarding (like ssh -R) !lsfwd * lists active forwards !rmfwd <index> * removes forward by index !plugins * lists available plugins !plugin <plugin> * execute a plugin !spawn <port> * spawns another client on the specified port !shell * runs /bin/sh !runas <username> <password> <domain> * restart xc with the specified user !met <port> * connects to a x64/meterpreter/reverse_tcp listener └ OS Specific Commands: !powershell * starts powershell with AMSI Bypass !rc <port> * connects to a local bind shell and restarts this client over it !runasps <username> <password> <domain> * restart xc with the specified user using powershell !vulns * checks for common vulnerabilities Linux Usage: └ Shared Commands: !exit !upload <src> <dst> * uploads a file to the target !download <src> <dst> * downloads a file from the target !lfwd <localport> <remoteaddr> <remoteport> * local portforwarding (like ssh -L) !rfwd <remoteport> <localaddr> <localport> * remote portforwarding (like ssh -R) !lsfwd * lists active forwards !rmfwd <index> * removes forward by index !plugins * lists available plugins !plugin <plugin> * execute a plugin !spawn <port> * spawns another client on the specified port !shell * runs /bin/sh !runas <username> <password> <domain> * restart xc with the specified user !met <port> * connects to a x64/meterpreter/reverse_tcp listener └ OS Specific Commands: !ssh <port> * starts sshd with the configured keys on the specified port [hide][Hidden Content]]
  19. Summary Gel4y Webshell is a backdoor built using the PHP programming language with the PHP procedural method in stealth mode where the file size will not exceed 15KB. Each function has been converted into a hex code to allow this webshell to penetrate the WAF (Firewall) server system. Features Multiple File Upload Create Folder and File File Download Bypassed 403 Forbidden 406 Not Acceptable Imunify360 [hide][Hidden Content]]
  20. Penelope is an advanced shell handler. Its main aim is to replace netcat as shell catcher during exploiting RCE vulnerabilities. It works on Linux and macOS and the only requirement is Python3. It is one script without 3rd party dependencies and hopefully it will stay that way. Among the main features are: Auto-upgrade shells to PTY (auto-resize included) Logging interaction with the targets Download files from targets Upload files to targets Upload preset scripts to targets Spawn backup shells Multiple sessions Multiple listeners Can be imported by exploits and get shell on the same terminal (see extras) [hide][Hidden Content]]
  21. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.3 Fixed missing output messages for Invoke-Binary Extracted AMSI bypass from the menu to avoid menu problems due to M$ AV signatures Dynamic AMSI bypass implemented to avoid AV signatures [hide][Hidden Content]]
  22. Features CMD - Command Execute commands Zone H Notifier Mass/Single Mirror Site on Zone H Notifier Back Connector Reverse Shell with following payload (PHP, RUBY, PERL, PYTHON, NETCAT) credits to my friend bloos3rpent. Mass Defacement Mass deface sites all folders on the same server [hide][Hidden Content]]
  23. [+] Added WinServer ASPX API [+] Bypass Mod_Security [+] Included Encoded & Decoded version [+] Bug fixes and other minor improvements [hide][Hidden Content]]
  24. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.2 Fixed minor duplicated code problem Dockerfile improvements Amsi bypass update [hide][Hidden Content]]
  25. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.0 Remote files/directories autocomplete feature (Thanks to arale61) Added option to log commands and outputs to a log file (Thanks to Borch Cañavate) [hide][Hidden Content]]

Chat Room

Chat Room

Chatroom Rules

No support in chat, open a thread.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.