hoaxshell icon indicating copy to clipboard operation
hoaxshell copied to clipboard

A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.

Results 24 hoaxshell issues
Sort by recently updated
recently updated
newest added

Does the second connection gets ignored since there isn't an to choose which connection to interact with.

The `-ng` and `-lt` options have been added to generate the PS payload for obtaining sessions using tunnelling tools like **Ngrok** or **LocalTunnel** in order to get around limitations like...

Hey! Read line does not work on Windows except if you include the `pyreadline` in the requirements file 👍 ![image](https://user-images.githubusercontent.com/40599884/186746283-c28d2f28-bb56-4b01-8241-b26d71324113.png)

Would it be possible to add an option to set a proxy to the reverse shell? At the moment I have to add -Proxy http://:3128 to the RAW payload.

Hey there, I noticed that the HTTPS option required OpenSSL or the user to create their own private key and certificate. I added the --ssl option from the command line...

Hello, when I run the command `sudo python3 hoaxshell.py -ng`, I get the following error: [Debug] Failed to initiate tunnel. Possible cause: You have a tunnel agent session already running...

is it possible to make hoaxshell generate the same payload every time so you can use a rubber ducky

as **gnureadline** isnt being useful for connecting with **windows to windows**, i found this to be useful. it works perfectly

Feath-Linux% ./hoaxshell.py -s test.duckdns.org ┬ ┬ ┌─┐ ┌─┐ ─┐ ┬ ┌─┐ ┬ ┬ ┌─┐ ┬ ┬ ├─┤ │ │ ├─┤ ┌┴┬┘ └─┐ ├─┤ ├┤ │ │ ┴ ┴ └─┘ ┴...