hoaxshell
hoaxshell copied to clipboard
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Results
24
hoaxshell issues
Sort by
recently updated
recently updated
newest added
Now using the pyreadline library to fix the issue
IEX : At line:1 char:16 + (echo bff3dbcb & cd) + ~ The ampersand (&) character is not allowed. The & operator is reserved for future use; wrap an ampersand...
…llowed error Update hoaxshell-listener.py for the ampersand (&) character is not allowed error.