{"id":22647365,"url":"https://github.com/processust/reverse_shell_udp","last_synced_at":"2025-04-12T02:12:29.510Z","repository":{"id":82910981,"uuid":"458375518","full_name":"ProcessusT/Reverse_Shell_UDP","owner":"ProcessusT","description":"Un simple reverse shell indétectable (1/65 sur virustotal au 12/02/2022) écrit en C# qui utilise un client socket UDP sur le port 53 (port DNS)  Ce script a été développé pour être utilisé sur le lab professionnel Rastalabs sur la plateforme HackTheBox et n'est pas prévu pour une utilisation différente.","archived":false,"fork":false,"pushed_at":"2022-02-12T00:01:54.000Z","size":2,"stargazers_count":14,"open_issues_count":0,"forks_count":8,"subscribers_count":2,"default_branch":"main","last_synced_at":"2025-04-12T02:12:19.897Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"C#","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/ProcessusT.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null}},"created_at":"2022-02-11T23:59:05.000Z","updated_at":"2023-08-12T14:42:30.000Z","dependencies_parsed_at":null,"dependency_job_id":"dc44f4b8-56fe-4a78-817a-5bd9e95cf08f","html_url":"https://github.com/ProcessusT/Reverse_Shell_UDP","commit_stats":null,"previous_names":["processust/reverse_shell_udp"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FReverse_Shell_UDP","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FReverse_Shell_UDP/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FReverse_Shell_UDP/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FReverse_Shell_UDP/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/ProcessusT","download_url":"https://codeload.github.com/ProcessusT/Reverse_Shell_UDP/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248505926,"owners_count":21115354,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-12-09T07:33:27.528Z","updated_at":"2025-04-12T02:12:29.483Z","avatar_url":"https://github.com/ProcessusT.png","language":"C#","readme":"# revshell_udp\n\n\nUn simple reverse shell indétectable (1/65 sur virustotal au 12/02/2022) écrit en C# qui utilise un client socket UDP sur le port 53 (port DNS)\n\n\nCe script a été développé pour être utilisé sur le lab professionnel Rastalabs sur la plateforme HackTheBox et n'est pas prévu pour une utilisation différente.\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fprocessust%2Freverse_shell_udp","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fprocessust%2Freverse_shell_udp","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fprocessust%2Freverse_shell_udp/lists"}