# Hershell Encrypted Reverse Shell (Cross-platform - Manual Mode) Author: metalkey
Creds: Ronan Kervella (Creator of Hershell)
Version: Version 0.5
## Instructions Hershell Github: https://github.com/sysdream/hershell (read all instructions on Hershell git before starting) 1. Compile all payloads and place binaries in the `payloads\$SWITCH_POSITION` directory (Double check binary names. Defaults are `mac32`, `linux32`, `win32.exe`) 2. Uncomment desired target OS payload lines and ensure others are commented out 3. Start ncat listener on your attacking machine, that is to receive the reverse shell (e.g. `ncat --ssl --ssl-cert server.pem --ssl-key server.key -lvp 4343`) 4. Execute attack via Bash Bunny