Search the Community

Showing results for tags 'shell'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin
  • Null3D's Nulled Group

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 155 results

  1. A flexible and scalable cross-plaform shell generator tool. A simple yet flexible cross-platform shell generator tool. Name: G(Great) Shell Description: A cross-platform shell generator tool that lets you generate whichever shell you want, in any system you want, giving you full control and automation. Supports the following languages and tools: PowerShell Python Bash Sh Perl Socat Netcat Nc Awk Lua NodeJS OpenSSL PHP Ruby Telnet Golang C# Dart Groovy Many more... [hide][Hidden Content]]
  2. WordPress webshell plugin for RCE A webshell plugin and interactive shell for pentesting a WordPress website. Features Webshell plugin for WordPress. Execute system commands via an API with ?action=exec. Download files from the remote system to your attacking machine with ?action=download. [hide][Hidden Content]]
  3. FOR : Hiding attacker IP in reverse shell (No direct interaction between attacker and target machine. Notion is used as a proxy hosting the reverse shell) Demo/Quick proof insertion within report High available and shareable reverse shell (desktop, browser, mobile) Encrypted and authenticated remote shell NOT FOR : Long and interactive shell session (see tacos for that) [hide][Hidden Content]]
  4. Powerful manager for Windows File Explorer context menu Overview Shell is a context menu extender that lets you handpick the items to integrate into Windows File Explorer context menu, create custom commands to access all your favorite web pages, files, and folders, and launch any application directly from the context menu. It also provides you a convenient solution to modify or remove any context menu item added by the system or third party software. Shell is a portable utility, so you don’t need to install anything on your PC. Features Lightweight, portable and relatively easy to use. Fully customize the appearance. Adding new custom items such as (sub-menu, menuitem and separator). Modify or remove items that already exist. Support all file system objects files, folders, desktop and taskbar. Support expressions syntax. with built-in functions and predefined variables. Support colors, glyphs, SVG, embedded icons, and image files such as .ico, .png or .bmp. Support search and filter. Support for complex nested menus. Support multiple column. Quickly and easily configure file in plain text. Minimal resource usage. No limitations. Requirements Microsoft Windows 7/8/10/11 [hide][Hidden Content]]
  5. What is tornado? Tornado is implements tor network with metasploit-framework tool and msfvenom module, you can easily create hidden services for your localhost .onion domain without portforwarding. If you have experience different remote administration tools, probably you know you need forward port with virtual private network or ngrok but in this sense with tornado, the tor network offers the possibility of making services in a machine accessible as hidden services without portforwarding, by taking advantage of the anonymity it offers and thereby preventing the real location of the machine from being exposed. tornado can do create hidden service with tor network generate cross platform msfvenom payload with fully undetectable shellcode execution not shikata_ga_nai things hidden service becomes available outside tor network and ready to reverse shell connection be careful with tor2web even onion network, the only suicide mission is wearing blinders. tornado not secure from victim's point of view: the point of tor is that users can connect without being eavesdropped on and going through the clearnet with tor2web, even with https seriously cripples the efforts made to protect users. Disclaimer This tool is only for testing and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. I assume no liability and are not responsible for any misuse or damage caused by this tool and software. [hide][Hidden Content]]
  6. itsMe

    Indosec Shell

    [hide][Hidden Content]]
  7. itsMe

    Zeerx7 Shell

    [hide][Hidden Content]]
  8. Anonymously Reverse shell over Tor Network using Hidden Services without port forwarding. This project implements the tor network with the metasploit-framework tool and msfvenom module. You can easily create hidden services for your LHOST .onion domain without portforwarding. If you have experienced different remote administration tools, probably you know you need a forward port with VPN or NGROK but in this sense, the Tor network offers the possibility of making services in a machine accessible as hidden services without portforwarding, by taking advantage of the anonymity it offers and thereby preventing the real location of the machine from being exposed. Currently, this project has that features. Create a hidden service Generate msfvenom payload with fully undetectable Hidden service becomes available outside tor network Disclaimer This tool is only for testing and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. I assume no liability and are not responsible for any misuse or damage caused by this tool and software. [hide][Hidden Content]]
  9. LAZYPARIAH is a simple and easily installable command-line tool written in pure Ruby that can be used during penetration tests and capture-the-flag (CTF) competitions to generate a range of reverse shell payloads on the fly. The reverse shell payloads that LAZYPARIAH supports include (but are not limited to): C binary payloads (compiled on the fly): c_binary Ruby payloads: ruby, ruby_b64, ruby_hex, ruby_c Powershell payloads: powershell_c, powershell_b64 Base64-encoded Python payloads: python_b64 Rust binary payloads (compiled on the fly): rust_binary PHP scripts containing base64-encoded Python payloads called via the system() function: php_system_python_b64 Java classes (compiled on the fly): java_class Perl payloads: perl, perl_b64, perl_hex, perl_c Simple PHP payloads (targeting specific file descriptors): php_fd, php_fd_c, php_fd_tags Dependencies Ruby >= 2.7.1 (LAZYPARIAH has not been tested on previous versions of Ruby) OpenJDK (Optional: Only required for java_class payloads.) GCC (Optional: Only required for c_binary payloads.) Rust (Optional: Only required for rust_binary payloads.) [hide][Hidden Content]]
  10. Description Linux is a powerful and widely used operating system, it is free and open source software. It can run on wide range of hardware platforms like desktops, servers, mobile devices and even supercomputers. Most of the top companies in the world use Linux servers. Linux is growing very rapidly and demand for Linux talent is on the rise. So acquiring Linux skills can help you land a job and get ahead in your career. This tutorial is designed for computer users who have limited or no previous knowledge of Linux. If you are complete beginner in Linux or have never worked on command line, then this course is for you. In this course you’ll learn Linux from scratch. Learn to Program Using Any Shell What you learn in this course can be applied to any shell, however the focus is on the bash shell and you’ll learn some really advanced bash features. Again, whether you’re using bash, bourne (sh), KornShell (ksh), C shell (csh), Z shell (zsh), or even the tcsh shell, you’ll be able to put what you learn in this course to good use. Perfect for Linux, Unix, Mac and More! Also, you’ll be able to use these scripts on any Linux environment including Ubuntu, Debian, Linux Mint, RedHat, Fedora, OpenSUSE, Slackware, Kali Linux and more. You’re scripts will even run on other operating systems such as Apple’s Mac OS X, Oracle’s Solaris, IBM’s AIX, HP’s HP-UX, FreeBSD, NetBSD, and OpenBSD. (Sorry, this course is NOT for Windows scripting or powershell scripting.) Become an effective Linux user and advance your Career. Learning the Linux Command Line will take you FAR! Learn to appreciate the power of the Linux command line. Understand the structure of the Linux File System. Learn how to utilize Linux man pages and help tools. Realize the differences between soft and hard links. Learn how to navigate your Linux File System using few simple commands! Learn how to create, modify and process files. Learn how to create your own Linux commands. Who this course is for: Anyone interested in shell scripting or shell programming. Anyone who wants to get started with Linux. Existing Linux users or learners who wants to be effective at using the Linux command Line. Aspiring Linux system administrators. Requirements No experience required [Hidden Content] [hide][Hidden Content]]
  11. A modern multiple reverse shell sessions/clients manager via terminal written in go Features Multiple service listening port Multiple client connections RESTful API Python SDK Reverse shell as a service (Pop a reverse shell in multiple languages without remembering idle commands) Download/Upload file with progress bar Full interactive shell Using vim gracefully in reverse shell Using CTRL+C and CTRL+Z in reverse shell Start servers automatically Port forwarding Initialize from configuration file Web UI v1.5.0 Latest **Notice** This temite version is INCOMPATIBLE with earlier versions (v1.4.*) But, the termite would be able to upgrade itself automatically from now on. **New features** 1. Support shell execution in termite 2. Support file reading and writing in termite 3. Support termite upgrading automatically 4. Redesign opcodes in termite protocol **Bug fix** 1. Fix termite double connection [hide][Hidden Content]]
  12. A simple shellcode encryptor/decryptor/executor to bypass anti-virus. [hide][Hidden Content]]
  13. A small reverse shell for Linux & Windows. Features Windows Usage: └ Shared Commands: !exit !upload <src> <dst> * uploads a file to the target !download <src> <dst> * downloads a file from the target !lfwd <localport> <remoteaddr> <remoteport> * local portforwarding (like ssh -L) !rfwd <remoteport> <localaddr> <localport> * remote portforwarding (like ssh -R) !lsfwd * lists active forwards !rmfwd <index> * removes forward by index !plugins * lists available plugins !plugin <plugin> * execute a plugin !spawn <port> * spawns another client on the specified port !shell * runs /bin/sh !runas <username> <password> <domain> * restart xc with the specified user !met <port> * connects to a x64/meterpreter/reverse_tcp listener └ OS Specific Commands: !powershell * starts powershell with AMSI Bypass !rc <port> * connects to a local bind shell and restarts this client over it !runasps <username> <password> <domain> * restart xc with the specified user using powershell !vulns * checks for common vulnerabilities Linux Usage: └ Shared Commands: !exit !upload <src> <dst> * uploads a file to the target !download <src> <dst> * downloads a file from the target !lfwd <localport> <remoteaddr> <remoteport> * local portforwarding (like ssh -L) !rfwd <remoteport> <localaddr> <localport> * remote portforwarding (like ssh -R) !lsfwd * lists active forwards !rmfwd <index> * removes forward by index !plugins * lists available plugins !plugin <plugin> * execute a plugin !spawn <port> * spawns another client on the specified port !shell * runs /bin/sh !runas <username> <password> <domain> * restart xc with the specified user !met <port> * connects to a x64/meterpreter/reverse_tcp listener └ OS Specific Commands: !ssh <port> * starts sshd with the configured keys on the specified port [hide][Hidden Content]]
  14. Features Windows Usage: └ Shared Commands: !exit !upload <src> <dst> * uploads a file to the target !download <src> <dst> * downloads a file from the target !lfwd <localport> <remoteaddr> <remoteport> * local portforwarding (like ssh -L) !rfwd <remoteport> <localaddr> <localport> * remote portforwarding (like ssh -R) !lsfwd * lists active forwards !rmfwd <index> * removes forward by index !plugins * lists available plugins !plugin <plugin> * execute a plugin !spawn <port> * spawns another client on the specified port !shell * runs /bin/sh !runas <username> <password> <domain> * restart xc with the specified user !met <port> * connects to a x64/meterpreter/reverse_tcp listener └ OS Specific Commands: !powershell * starts powershell with AMSI Bypass !rc <port> * connects to a local bind shell and restarts this client over it !runasps <username> <password> <domain> * restart xc with the specified user using powershell !vulns * checks for common vulnerabilities Linux Usage: └ Shared Commands: !exit !upload <src> <dst> * uploads a file to the target !download <src> <dst> * downloads a file from the target !lfwd <localport> <remoteaddr> <remoteport> * local portforwarding (like ssh -L) !rfwd <remoteport> <localaddr> <localport> * remote portforwarding (like ssh -R) !lsfwd * lists active forwards !rmfwd <index> * removes forward by index !plugins * lists available plugins !plugin <plugin> * execute a plugin !spawn <port> * spawns another client on the specified port !shell * runs /bin/sh !runas <username> <password> <domain> * restart xc with the specified user !met <port> * connects to a x64/meterpreter/reverse_tcp listener └ OS Specific Commands: !ssh <port> * starts sshd with the configured keys on the specified port [hide][Hidden Content]]
  15. itsMe

    Gel4y Mini Shell Backdoor

    Summary Gel4y Webshell is a backdoor built using the PHP programming language with the PHP procedural method in stealth mode where the file size will not exceed 15KB. Each function has been converted into a hex code to allow this webshell to penetrate the WAF (Firewall) server system. Features Multiple File Upload Create Folder and File File Download Bypassed 403 Forbidden 406 Not Acceptable Imunify360 [hide][Hidden Content]]
  16. itsMe

    Penelope Shell Handler

    Penelope is an advanced shell handler. Its main aim is to replace netcat as shell catcher during exploiting RCE vulnerabilities. It works on Linux and macOS and the only requirement is Python3. It is one script without 3rd party dependencies and hopefully it will stay that way. Among the main features are: Auto-upgrade shells to PTY (auto-resize included) Logging interaction with the targets Download files from targets Upload files to targets Upload preset scripts to targets Spawn backup shells Multiple sessions Multiple listeners Can be imported by exploits and get shell on the same terminal (see extras) [hide][Hidden Content]]
  17. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.3 Fixed missing output messages for Invoke-Binary Extracted AMSI bypass from the menu to avoid menu problems due to M$ AV signatures Dynamic AMSI bypass implemented to avoid AV signatures [hide][Hidden Content]]
  18. Features -> Create a hidden service -> Generate non-staged payload (python/meterpreter_reverse_http) -> Convert url using Tor2Web: a final extension .ws will be added, so url becomes available outside tor network -> Generate batch .rc file for msfconsole [hide][Hidden Content]]
  19. itsMe

    GrayHat Phantom Backdoor Shell

    Features CMD - Command Execute commands Zone H Notifier Mass/Single Mirror Site on Zone H Notifier Back Connector Reverse Shell with following payload (PHP, RUBY, PERL, PYTHON, NETCAT) credits to my friend bloos3rpent. Mass Defacement Mass deface sites all folders on the same server [hide][Hidden Content]]
  20. itsMe

    ALFA SHELL V4.1 - Decoded

    [+] Added WinServer ASPX API [+] Bypass Mod_Security [+] Included Encoded & Decoded version [+] Bug fixes and other minor improvements [hide][Hidden Content]]
  21. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.2 Fixed minor duplicated code problem Dockerfile improvements Amsi bypass update [hide][Hidden Content]]
  22. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.0 Remote files/directories autocomplete feature (Thanks to arale61) Added option to log commands and outputs to a log file (Thanks to Borch Cañavate) [hide][Hidden Content]]
  23. YAPS – Yet Another PHP Shell As the name reveals, this is yet another PHP reverse shell, one more among hundreds available out there. It is a single PHP file containing all its functions and you can control it via a simple netcat listener (nc -lp 1337). In the current version, its main functions support only Linux systems, but I’m planning to make it work with Windows too. Features Single PHP file (no need to install packages, libs, or download tons of files) Works with netcat, ncat, socat, multi/handler, almost any listener Customizable password protection No logs in .bash_history Can do some enumeration Network info (interfaces, iptables rules, active ports) User info List SUID and GUID files Search for SSH keys (public and private) List crontab List writable PHP files Auto download LinPEAS, LinEnum, or Linux Exploit Suggester Write and run PHP code on a remote host (Semi) Stabilize shell Cons Connection isn’t encrypted (yet) (nc does not support SSL) Not fully interactive (although you can spawn an interactive shell with !stabilize) CTRL+C breaks it; can’t use arrows to navigate (unless you use rlwrap nc -lp <ip> <port>) [hide][Hidden Content]]
  24. itsMe

    PHP Reverse Shell

    Just a little refresh on the popular PHP reverse shell script pentestmonkey/php-reverse-shell. Credits to the original author! Works on Linux OS and macOS with /bin/sh and Windows OS with cmd.exe. Script will automatically detect an underlying OS. Works with both ncat and multi/handler. Tested on XAMPP for Linux v7.3.19 (64-bit) with PHP v7.3.19 on Kali Linux v2020.2 (64-bit). Tested on XAMPP for OS X v7.4.10 (64-bit) with PHP v7.4.10 on macOS Catalina v10.15.6 (64-bit). Tested on XAMPP for Windows v7.4.3 (64-bit) with PHP v7.4.3 on Windows 10 Enterprise OS (64-bit). In addition, everything was tested on Docker images nouphet/docker-php4 with PHP v4.4.0 and steeze/php52-nginx with PHP v5.2.17. Made for educational purposes. I hope it will help! [hide][Hidden Content]]
  25. Description In this course I will walk you through, how you could build a full working python shell without using IP or PORT forwarding method. Hope you will find useful tips to think outside a box when you always try to build your own program. We use the Simple mail transfer protocol, instead of the SOCKET protocol. I was trying to navigate many of the course published on Udemy but didn’t find a course who use SMPT protocol more than in a keylogger apps. So in this course, I try to take this program to next level, and I build a full script that works even better than what we can build using the SOCKET protocol. Just to list some of them you don’t need to use the IP/Port forwarding method to make your program work outside the local area network. SO you could just use this type of shell outside your network as simple as it is. DISCLAIMER this course is for educational purposes only. SMTP servers are complicated, and if you’re just dipping your toe into the how-email-gets-sent world, it’s easy to feel overwhelmed. To help you navigate your email sending, we’ve put together a list of the most common SMTP server questions we receive, so you’ll be an SMTP expert in no time. What is an SMTP server? An SMTP (Simple Mail Transfer Protocol) server is an application that’s primary purpose is to send, receive, and/or relay outgoing mail between email senders and receivers. An SMTP server will have an address (or addresses) that can be set by the mail client or application that you are using. When you send an email, the SMTP server processes your email, decides which server to send the message to, and relays the message to that server. The recipient’s inbox service provider, such as Gmail or AOL then downloads the message and places it in the recipient’s inbox. You can find more details on SMTP servers on our docs page. Is an SMTP server the same as a normal server? Technically, yes. Like most servers, the SMTP server processes data to send to another server, but it has the very specific purpose of processing data related to the sending, receiving, and relaying of email. An SMTP server is also not necessarily on a machine. It is an application that is constantly running in anticipation of sending new mail. Why are SMTP servers important? Without an SMTP server, your email wouldn’t make it to its destination. Once you hit “send,” your email transforms into a string of code that is then sent to the SMTP server. The SMTP server is able to process that code and pass on the message. If the SMTP server wasn’t there to process the message, it would be lost in translation. Additionally, the SMTP server verifies that the outgoing email is from an active account, acting as the first safeguard in protecting your inbox from illegitimate email. It also will send the email back to the sender if it can’t be delivered. This informs the sender that they have the wrong email address or that their email is being blocked by the receiving server. If you’re looking for more information on SMTP, check out our post, SMTP Service Crash Course. Source (sendgrid/blog/what-is-an-smtp-server/) What we learn on this course? on this course we will build fully functional reverse shell, which could work outside your local area network. what makes this program different from others? on this course we build our reverse shell using SMTP protocol instead of using SOCAT protocol. 2w Who this course is for: Anyone who wants to learn about Ethical hacking and Python programming. What you’ll learn Create reverse shell which could work anywhere in the world WITHOUT using your public IP address or PORT forwarding method. [hide][Hidden Content]]