Windows reverse shell that (almost) always works.
Tags
Common Information
Type | Value |
---|---|
UUID | 79635f78-60fc-4ed1-b506-c8cc490d223a |
Fingerprint | 1cdb4958d58c348f |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Sept. 10, 2024, 10:05 a.m. |
Added to db | Sept. 10, 2024, 12:53 p.m. |
Last updated | Nov. 17, 2024, 7:44 p.m. |
Headline | Windows reverse shell that (almost) always works. |
Title | Windows reverse shell that (almost) always works. |
Detected Hints/Tags/Attributes | 61/1/47 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 136 | ✔ | InfoSec Write-ups - Medium | https://infosecwriteups.com/feed | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 11 | www.revshells.com |
|
Details | Domain | 4127 | github.com |
|
Details | Domain | 675 | www.linkedin.com |
|
Details | Domain | 434 | medium.com |
|
Details | Domain | 339 | system.net |
|
Details | File | 226 | certutil.exe |
|
Details | File | 1 | certutile.exe |
|
Details | File | 1 | shell-443.txt |
|
Details | File | 10 | powercat.ps1 |
|
Details | File | 2125 | cmd.exe |
|
Details | File | 4 | b64.txt |
|
Details | File | 1 | powercat_shell.bat |
|
Details | File | 1 | decode+b64.txt |
|
Details | File | 1 | +powercat_shell.bat |
|
Details | File | 1 | start+powercat_shell.bat |
|
Details | File | 1 | hex.txt |
|
Details | File | 1 | hex_shell.bat |
|
Details | File | 1 | decode+hex.txt |
|
Details | File | 1 | +hex_shell.bat |
|
Details | File | 1 | start+hex_shell.bat |
|
Details | File | 1 | reverse_php.php |
|
Details | File | 1 | shells_windows.txt |
|
Details | File | 1 | node_shell.js |
|
Details | File | 4 | h.txt |
|
Details | File | 1 | multiple_shells.bat |
|
Details | File | 1 | decodehex+h.txt |
|
Details | File | 1 | +multiple_shells.bat |
|
Details | File | 1 | start+multiple_shells.bat |
|
Details | Github username | 4 | digininja |
|
Details | Github username | 6 | besimorhino |
|
Details | Github username | 5 | t3l3machus |
|
Details | IPv4 | 1 | 172.16.78.251 |
|
Details | IPv4 | 1 | 172.16.78.243 |
|
Details | IPv4 | 2 | 192.168.62.165 |
|
Details | IPv4 | 1441 | 127.0.0.1 |
|
Details | IPv4 | 619 | 0.0.0.0 |
|
Details | Url | 9 | https://www.revshells.com |
|
Details | Url | 3 | https://github.com/digininja/dvwa |
|
Details | Url | 1 | https://www.linkedin.com/pulse/how-setup-dvwa-windows-10-using-xampp-shubham-yadav/. |
|
Details | Url | 1 | https://medium.com/system-weakness/the-ultimate-pen-tester-guide-to-command-injection-d29fac2f4c3b. |
|
Details | Url | 1 | http://172.16.78.251/dvwa/vulnerabilities/exec |
|
Details | Url | 1 | http://192.168.62.165/dvwa/vulnerabilities/exec |
|
Details | Url | 1 | https://github.com/besimorhino/powercat |
|
Details | Url | 1 | https://medium.com/system-weakness/evade-windows-defender-reverse-shell-detection-6fa9f5eee1d1 |
|
Details | Url | 3 | https://raw.githubusercontent.com/besimorhino/powercat/master/powercat.ps1 |
|
Details | Url | 1 | http://172.16.78.251:80/shell-443.txt |
|
Details | Url | 3 | https://github.com/t3l3machus/hoaxshell |