Multi-Threaded Python Reverse Shell
Use this python reverse shell with the -f6 option
Use this python reverse shell with the -f6 option
An upgrade was pushed to Rmutate that will obfuscate your python variables with the -o hex_mod when using the -f6 action. example var1 would get a random variable and the change may look something like Note: The process can take quite a long time, maybe several minutes if your code is long enough. I added […]
Here you will see how to manage the quote output from Rmutate. When you first get the Rmutate output from a script, it will be designed for Rmutate syntax, but what if you want to strip the quotes down? You can strip the quotes two times. The first time will give you the executioner + […]
This is very useful when in Linux you get relative instead of absolute addresses and in Windows where you get an overwhelming amount of functions and you need to filter down to what really matters (what the programmer actually made). In OSX it isn’t needed as much sense you always get the absolute addresses and […]
This is the most powerful way to quickly make malware for windows. With Rmutate you will be able to bypass the default “Restricted” Execution Policy for PowerShell Scripts. Also, you have the added option for prompting for UAC acceptance. If UAC is turned off, your shellcode will automatically execute as Admin as long as the […]
This is the best way to easily create malware for Linux/OSX. This is because every OSX box and almost every Linux box has python, they always have bash and in frequent cases have ruby. We can leverage these easy languages that do not require compilers to execute on the victim machine. This is really great […]
In most cases this method of shellcode dev should not be used because the “Write to Mem” is superior over the “Write to HDD” Let’s take the following reverse shell written in python which every OSX box and almost every Linux box has. Next we will remove un-needed newlines and spaces. For help with formatting […]
In most cases this method of shellcode dev should not be used because the “Write to Mem” is superior over the “Write to HDD” Also, note that I have tested this to work on Kali Linux. This may not work on other linux distros like Ubuntu. Let’s take the following reverse shell written in python […]
Here you will see how easy it is to instantly send your payloads to metasploit. Even if you made a windows payload made with Rmutate.exe, you can still move that ruby file over to your other VM via a shared folder (which both VMware and VirtualBox have) and then have Rmutate send it to your […]
A very large amount of the code for Shell commands can be found here http://shell-storm.org/shellcode/ However, it isn’t near as usable as Rmutate because Rmutate will help you with the following. You can automatically remove bad bytes by XORing two registers together You can instantly port your shellcode to metasploit. For more info, click here […]