mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-12-20 03:58:25 +00:00
Hershell Encrypted Reverse Shell (Cross-platform - Manual Mode)
Author: metalkey
Creds: Ronan Kervella (Creator of Hershell)
Version: Version 0.5
Instructions
Hershell Github: https://github.com/sysdream/hershell (read all instructions on Hershell git before starting)
- Compile all payloads and place binaries in the
payloads\$SWITCH_POSITIONdirectory (Double check binary names. Defaults aremac32,linux32,win32.exe) - Uncomment desired target OS payload lines and ensure others are commented out
- Start ncat listener on your attacking machine, that is to receive the reverse shell (e.g.
ncat --ssl --ssl-cert server.pem --ssl-key server.key -lvp 4343) - Execute attack via Bash Bunny