Skip to content

Commit 6d8995a

Browse files
authored
Update README.md
1 parent 75157c5 commit 6d8995a

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
#Shellware
1+
# Shellware
22

33
Upon execution Shellware will prompt for administrative privileges, once granted it wil copy itself to the C:\Users directory and add a registry entry for persistence. It will open port 8899 on the target machine and listen for a connection. Once a connection is established the program spawns an interactive OS shell. To make the program a little less suspiscious it might prudent to bind Shellware.exe to an innocent binary for deployment.
44

@@ -7,11 +7,11 @@ to disable error reporting, system restore and tries to disable LUA. I've had mi
77
been consistently succesful throughout testing on various platforms.
88

99

10-
#Note
10+
## Note
1111
The shellcode responsible for the operation of the bind shell can easily be replaced with shellcode for a Reverse TCP Shell or Meterpreter service by generating said
1212
payload with the Metasploit Framework.
1313

1414

15-
#Usage
15+
## Usage
1616
Compile the script to exe with pyinstaller and the program is ready for distribution.
1717

0 commit comments

Comments
 (0)