ee48a74dc6
Updated author details |
||
---|---|---|
.. | ||
README.md | ||
payload.txt |
README.md
Hershell Encrypted Reverse Shell (Cross-platform - Manual Mode)
Author: metalkey
Creds: Ronan Kervella (Creator of Hershell)
Version: Version 0.5
Instructions
Hershell Github: https://github.com/sysdream/hershell (read all instructions on Hershell git before starting)
- Compile all payloads and place binaries in the
payloads\$SWITCH_POSITION
directory (Double check binary names. Defaults aremac32
,linux32
,win32.exe
) - Uncomment desired target OS payload lines and ensure others are commented out
- Start ncat listener on your attacking machine, that is to receive the reverse shell (e.g.
ncat --ssl --ssl-cert server.pem --ssl-key server.key -lvp 4343
) - Execute attack via Bash Bunny