You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Upon execution Shellware will prompt for administrative privileges, once granted it wil copy itself to the C:\Users directory and add a registry entry for persistence.
4
+
It will open port 8899 on the target machine and listen for a connection. Once a connection is established the program spawns an interactive OS shell.
5
+
6
+
Furthermore, the program attempts to tamper with certain registry entries to protect itself somewhat(and be generally annoying). The registry tampering attempts
7
+
to disable error reporting, system restore and tries to disable LUA. I've had mixed results on different Windows platforms, however a registry entry for persistence has
8
+
been consistently succesful throughout testing on various platforms.
9
+
10
+
11
+
#Note
12
+
The shellcode responsible for the operation of the bind shell can easily be replaced with shellcode for a Reverse TCP Shell or Meterpreter service by generating said
13
+
payload with the Metasploit Framework.
14
+
15
+
16
+
#Usage
17
+
Compile the script to exe with pyinstaller using the --noconsole and --onefile flags and the program is ready for distribution.
0 commit comments