hoaxshell
hoaxshell copied to clipboard
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Does the second connection gets ignored since there isn't an to choose which connection to interact with.
The `-ng` and `-lt` options have been added to generate the PS payload for obtaining sessions using tunnelling tools like **Ngrok** or **LocalTunnel** in order to get around limitations like...
Hey! Read line does not work on Windows except if you include the `pyreadline` in the requirements file 👍 
Would it be possible to add an option to set a proxy to the reverse shell? At the moment I have to add -Proxy http://:3128 to the RAW payload.
Hey there, I noticed that the HTTPS option required OpenSSL or the user to create their own private key and certificate. I added the --ssl option from the command line...
Hello, when I run the command `sudo python3 hoaxshell.py -ng`, I get the following error: [Debug] Failed to initiate tunnel. Possible cause: You have a tunnel agent session already running...
is it possible to make hoaxshell generate the same payload every time so you can use a rubber ducky
as **gnureadline** isnt being useful for connecting with **windows to windows**, i found this to be useful. it works perfectly
Feath-Linux% ./hoaxshell.py -s test.duckdns.org ┬ ┬ ┌─┐ ┌─┐ ─┐ ┬ ┌─┐ ┬ ┬ ┌─┐ ┬ ┬ ├─┤ │ │ ├─┤ ┌┴┬┘ └─┐ ├─┤ ├┤ │ │ ┴ ┴ └─┘ ┴...