Added ncat.exe to listeners

Allows for simple Windows ncat.exe calling from inside of WSL, meaning the listener runs on windows and binds to the windows port and not a NAT'ed WSL host.
This commit is contained in:
zmweske 2022-09-24 14:31:54 -05:00 committed by GitHub
parent 2c072ae5a1
commit 4703cfd570
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -451,6 +451,7 @@ const rsgData = {
listenerCommands: [ listenerCommands: [
['nc', 'nc -lvnp {port}'], ['nc', 'nc -lvnp {port}'],
['ncat', 'ncat -lvnp {port}'], ['ncat', 'ncat -lvnp {port}'],
['ncat.exe', 'ncat.exe -lvnp {port}'],
['ncat (TLS)', 'ncat --ssl -lvnp {port}'], ['ncat (TLS)', 'ncat --ssl -lvnp {port}'],
['rlwrap + nc', 'rlwrap -cAr nc -lvnp {port}'], ['rlwrap + nc', 'rlwrap -cAr nc -lvnp {port}'],
['rustcat', 'rcat -lp {port}'], ['rustcat', 'rcat -lp {port}'],