-
Similar Content
-
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Anonymously Reverse shell over Tor Network using Hidden Services without port forwarding.
This project implements the tor network with the metasploit-framework tool and msfvenom module. You can easily create hidden services for your LHOST .onion domain without portforwarding. If you have experienced different remote administration tools, probably you know you need a forward port with VPN or NGROK but in this sense, the Tor network offers the possibility of making services in a machine accessible as hidden services without portforwarding, by taking advantage of the anonymity it offers and thereby preventing the real location of the machine from being exposed.
Currently, this project has that features.
Create a hidden service
Generate msfvenom payload with fully undetectable
Hidden service becomes available outside tor network
Disclaimer
This tool is only for testing and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. I assume no liability and are not responsible for any misuse or damage caused by this tool and software.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. PowerShell scripts for communicating with a remote host.
Remote host will have a full control over the client and all the underlying system commands.
Check shells based on:
Invoke-Expression PowerShell command here,
process pipes here.
Tested with PowerShell v5.1.19041.1645 on Windows 10 Enterprise OS (64-bit).
Made for educational purposes. I hope it will help!
Hidden Content
Give reaction to this post to see the hidden content. -
By 0x1
Hidden Content
Give reaction to this post to see the hidden content.
Features
Generate common listeners and reverse shells Raw mode to cURL shells to your machine. Button to increment the listening port number by 1 URI and Base64 encoding LocalStorage to persist your configuration Dark and Light Modes Hosted Instance
https://revshells.com
HTML Source Code && More Info
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. PSRansom is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate encryption process of a generic ransomware in any system on any system with PowerShell installed on it. Thanks to the integrated C2 server, you can exfiltrate files and receive client information via HTTP.
All communication between the two elements is encrypted or encoded so as to be undetected by traffic inspection mechanisms, although at no time is HTTPS used at any time.
Requirements
PowerShell 4.0 or greater
This software does not offer any kind of guarantee. Its use is exclusive for educational environments and / or security audits with the corresponding consent of the client. I am not responsible for its misuse or for any possible damage caused by it.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Available Languages
Bash Netcat PHP Ncat Python Python3 Perl Telnet PowerShell Awk Socat Ruby Xterm Gawk
Hidden Content
Give reaction to this post to see the hidden content.
-