mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
Add Hershell Encrypted Reverse shell payload (#335)
This commit is contained in:
committed by
Sebastian Kinne
parent
032061688d
commit
65d652a15c
@@ -0,0 +1,14 @@
|
||||
# Hershell Encrypted Reverse Shell (Cross-platform - Manual Mode)
|
||||
|
||||
Author: m3t4lk3y<br>
|
||||
Creds: Ronan Kervella (Creator of Hershell)<br>
|
||||
Version: Version 0.5<br>
|
||||
|
||||
## Instructions
|
||||
|
||||
Hershell Github: https://github.com/sysdream/hershell (read all instructions on Hershell git before starting)
|
||||
|
||||
1. Compile all payloads and place binaries in the `payloads\$SWITCH_POSITION` directory (Double check binary names. Defaults are `mac32`, `linux32`, `win32.exe`)
|
||||
2. Uncomment desired target OS payload lines and ensure others are commented out
|
||||
3. Start ncat listener on your attacking machine, that is to receive the reverse shell (e.g. `ncat --ssl --ssl-cert server.pem --ssl-key server.key -lvp 4343`)
|
||||
4. Execute attack via Bash Bunny
|
||||
Reference in New Issue
Block a user