Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/waived/vb-reverse-tcp
Reverse TCP shell in Visual Basic | NET Framework 4.8 | FUD
https://github.com/waived/vb-reverse-tcp
backdoor fully-undetectable fully-undetectable-trojan multi-client reverse-tcp reverse-tcp-payload reverse-tcp-shell visual-basic
Last synced: 6 days ago
JSON representation
Reverse TCP shell in Visual Basic | NET Framework 4.8 | FUD
- Host: GitHub
- URL: https://github.com/waived/vb-reverse-tcp
- Owner: waived
- Created: 2024-10-29T18:48:53.000Z (2 months ago)
- Default Branch: main
- Last Pushed: 2024-10-29T18:56:41.000Z (2 months ago)
- Last Synced: 2024-11-08T14:26:28.424Z (about 2 months ago)
- Topics: backdoor, fully-undetectable, fully-undetectable-trojan, multi-client, reverse-tcp, reverse-tcp-payload, reverse-tcp-shell, visual-basic
- Homepage:
- Size: 153 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.txt
Awesome Lists containing this project
README
|==================================|
|==== VB SHELL - REVERSE TCP ====|
|==================================|Released on:
10.29.2024 @ 14:56Description:
Via a Reverse-TCP-connection, the 'server.exe' controller can manage
multiple incoming-connections from devices infected with 'client.exe'How to use:
Simply edit the Client project and replace the RHOST and RPORT value
with the correct IP Address and server Port assigned to the attacker C2.Note: There are no features/functions built into this shell. It only
functions as a remote cmd shell into a system. If said command
statements sent to the user yield a verbose output, the client.exe
backdoor will report the output back to the attacker.This shell CANNOT manage sessions with devices in a concurrent
manner, nor switch between sessions. As each device phones-home
to server.exe you will have the ability to reject or accept each
incoming connection. After a session is over, enter "goodbye"Warning: after "goodbye" is sent, the shell will no longer report
home. This can be easily modified to revive the connection regardless
of commands given by the C2. This overall basic shell design servers
as a basic penetration testing / red teaming program.Good luck, and use responsibly!