top | item 29553057

(no title)

koins | 4 years ago

Hey HN!

Today I'd like to share what will hopefully be just the beginning of a collection of offensive security tools I write in Rust. I decided to give this a shot because I wanted to be able to generate my own reverse shells for CTFs and the like without needing to rely solely on 3rd party tools.

With a quick change to the config.rs file, you can compile a TCP reverse shell that will point back to your machine whether your target is running Linux or Windows. Linux uses Rust's std::process::Command while Windows uses the windows::Win32 APIs.

Over time I intend to create more tools that use this as a base. Some ideas include: a TCP reverse shell that performs process migration, an obfuscated version for circumventing antivirus, and a staged version. Would love to hear what you think about it!

Happy hacking

discuss

order

No comments yet.