#reverseshell

Rene Robichaudnerowild
2025-04-14

BPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks
gbhackers.com/bpfdoor-malware/

2024-10-26

Mon dieu - Penelope is alright! Probably my favorite #reverseshell catcher for #linux targets. github.com/brightio/penelope

Highly recommend!

2024-09-09

Chinese APT Abuses VSCode to Target Government in Asia

[TR: Wait what? VSCode has a reverse shell feature?! Turn this off. Sounds like something proposed by another large company’s dev team recently.] #devtools #reverseshell #c2

unit42.paloaltonetworks.com/st

2024-04-04

Why ara #poc for #vulnerability always #reverseshell ? I get that a reverse shell via RCE is a scary magic trick. But in practical #pentesting more often than not I'd rather have a single fire DNS lookup or HTTP request. It's much saver than dropping a shell into a customers environment and it does the job.

#informationsecurity

2024-02-24

Hello!
I wanted to share 2 reverse shells I have made in C, for both Windows and Linux! It's only the source codes of them, non-compiled that is.

They are made with being as short as possible in mind, so they are not "fancy" in any way.

Contributions is ofc welcome! Reach out to me if you have any questions.
Have a nice day! I will leave the link to the GitHub Repo below.

- github.com/loneicewolf/Reverse

*Hopefully they are useful :tuturu:​

#reverseshells #reverseshell #reverseengineering

2023-11-07

SaturdayMP Show #18: Hack the Box - Busqueda Part 2 (Reverse Shell)

youtu.be/x7oDT3eYqyI

In this episode I get a reverse shell working and make some progress on capturing the root flag.

Question you want answered in a future video? Pair on a problem? Constructive feedback? DM me or email ask@saturdaymp.com.

#hackthebox #cybersecurity #reverseshell #saturdaymp #saturdaympshow

2023-08-15

I had a command injection vulnerability, but the target system didn't have netcat or other (obvious) means of getting a reverse shell. What to do? I wrote a minuscule "nc -e /bin/sh" in C + mips assembly, then wrote a small JavaScript stager that would encode the binary to a "echo -ne 'payload'" command that would then be used to drop the binary to /tmp, chmod it and execute with desired ip address and port. The nanonc tool sintonen.fi/src/nanonc/ supports both listen and connect back modes. The code calls linux kernel directly, doesn't use libc at all and has a custom startup code. The (low effort) stripped mipsel binary was 1372 bytes. I'm sure it could be made way way smaller, but this was well within reason already.

Was this total overkill and wholly unnecessary amount of work just to exploit this vulnerability? Yes. Did I learn a lot about mips platform, mips calling conventions and how to create tiny apps calling the linux kernel directly? Oh yes. #infosec #hacking #exploitation #tooling #reverseshell

readelf -e output of the stripped down nanonc for mipselnanonc minimal startup code with support for argc and argv.Part of the nanonc main application.Partial nanonc syscallhack.h showing the method of implementing wrappers for libc calls. In this screenshot only fork(2) implementation is visible.
Brian Vermeerbrianverm
2023-07-27
Heckin Teagan :verified_trans:​:donor:🛩️heckinteagan@infosec.exchange
2022-12-03

new shellgen be like

#InfoSec #RedTeam #DFIR #ReverseShell

Andreas Finstad :verified:4ndr34z@infosec.exchange
2022-11-18

Updated "Shells" to version 1.4.2

Check it out:
github.com/4ndr34z/shells

#infosec #reverseshell #AMSI

2021-03-19

Serious Security: Mac “supply chain” backdoor takes aim at Xcode devs - Just one tiny line of script in your Xcode project - and you've been pwned! nakedsecurity.sophos.com/2021/ #uncategorized #reverseshell #malware #macos #xcode

Mr. Curious! :mastodon:CyberHues
2020-09-01

details a campaign targeting devices, where attackers are using a three-year-old to deploy a - blog.netlab.360.com/in-the-wil

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst