{"id":24333120,"url":"https://github.com/nchgroup/shell_reverse_tcp","last_synced_at":"2026-05-10T16:35:21.273Z","repository":{"id":270903957,"uuid":"911798261","full_name":"nchgroup/shell_reverse_tcp","owner":"nchgroup","description":"msfvenom windows/x64/shell_reverse_tcp payload generator without dependencies","archived":false,"fork":false,"pushed_at":"2025-07-09T18:04:35.000Z","size":8,"stargazers_count":2,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-07-26T03:35:05.484Z","etag":null,"topics":["backdoor","go","golang","malware","metasploit","msfvenom","payload","reverse","reverse-shell","shellcode"],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/nchgroup.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2025-01-03T21:58:15.000Z","updated_at":"2025-07-09T18:04:39.000Z","dependencies_parsed_at":"2025-02-15T23:20:07.173Z","dependency_job_id":"4f078cdf-ffa0-4e94-a899-54574ab24d46","html_url":"https://github.com/nchgroup/shell_reverse_tcp","commit_stats":null,"previous_names":["nchgroup/shell_reverse_tcp"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/nchgroup/shell_reverse_tcp","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/nchgroup%2Fshell_reverse_tcp","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/nchgroup%2Fshell_reverse_tcp/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/nchgroup%2Fshell_reverse_tcp/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/nchgroup%2Fshell_reverse_tcp/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/nchgroup","download_url":"https://codeload.github.com/nchgroup/shell_reverse_tcp/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/nchgroup%2Fshell_reverse_tcp/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":32863980,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-05-10T13:40:02.631Z","status":"ssl_error","status_checked_at":"2026-05-10T13:40:02.145Z","response_time":54,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.5:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["backdoor","go","golang","malware","metasploit","msfvenom","payload","reverse","reverse-shell","shellcode"],"created_at":"2025-01-18T03:13:14.218Z","updated_at":"2026-05-10T16:35:21.252Z","avatar_url":"https://github.com/nchgroup.png","language":"Go","funding_links":[],"categories":[],"sub_categories":[],"readme":"# shell_reverse_tcp\nmsfvenom windows/x64/shell_reverse_tcp payload generator without dependencies\n\n# Help\n\n```\n$ ./shell_reverse_tcp -h\nUsage of ./shell_reverse_tcp:\n  -f string\n        Formats: {raw, hex, base64, c, python, rust, csharp, psh, vba} (default \"raw\")\n  -l string\n        LHOST IP address (default \"127.0.0.1\")\n  -p int\n        Port number (0-65535) (default 4444)\n```\n\n## Example\n\n```\n$ ./shell_reverse_tcp -l 192.168.1.2 -p 4444 -f raw \u003e shellcode.bin\n```\n\n# Build\n\n```bash\ngit clone https://github.com/nchgroup/shell_reverse_tcp\ncd shell_reverse_tcp/\ngo build .\n```\n\n# Project spirit\nGenerate your payload in x64 quickly and easily without dependencies to perform AV/EDR evasion tests on Windows in amd64, so you can use encoders, ciphers, obfuscators, whatever.\n\n# References\n* https://vay3t.medium.com/malware-development-generando-shellcodes-de-metasploit-sin-metasploit-aa120ffcdd92\n* https://github.com/rapid7/metasploit-framework/blob/master/modules/payloads/singles/windows/x64/shell_bind_tcp.rb#L47\n* https://github.com/vay3t/asm-shell_reverse_tcp\n\n# Authors\n* [Huerfano](https://www.linkedin.com/in/leonardo-astorga-20b1095a/)\n* [Vay3t](https://vay3t.org)\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fnchgroup%2Fshell_reverse_tcp","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fnchgroup%2Fshell_reverse_tcp","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fnchgroup%2Fshell_reverse_tcp/lists"}