t3l3machus/hoaxshell
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
PythonBSD-2-Clause
Issues
- 1
Not working with ngrok
#60 opened by HussHemAG - 3
Error with -encodedcommand base64
#63 opened by anonymous300502 - 1
The ampersand (&) character is not allowed.
#61 opened by brambeekman - 1
.
#34 opened by siddharthjain25 - 5
Is this linux only?
#26 opened by lokzz - 2
use with rubber ducky?
#56 opened by rocco7657 - 4
No shell ?
#59 opened by SmailDH - 0
ddns support
#55 opened by donttellmeimcute - 0
domain as server
#54 opened by juansonnn - 2
Logo kindof sus
#53 opened by victoralan2 - 0
Starting Error
#52 opened by throwawaya609 - 1
- 2
Detected by antivirus!!
#50 opened by Divinemonk - 2
Advice for upgrade
#44 opened by PureWizard - 3
Feature Request: Reverse Shell Proxy settings
#6 opened by corsch - 1
- 0
Cant install gnureadline
#46 opened by Ricc4rdo0107 - 1
Not working
#43 opened by 0067sdsm - 6
- 1
Got Blocked by Microsoft-Defender
#42 opened by irahari - 1
Antivirus blocked it
#41 opened by GrehGrahGree - 1
package readline not installing on python 3.10
#40 opened by MrurBo - 3
- 0
it does not work anymore :)
#38 opened by reallifeinulas - 1
already detected by windows defender
#37 opened by xbeatzsec - 1
- 4
- 9
Localtunnel not establishing connection
#32 opened by Skylark055 - 1
- 10
How to use hoaxshell with ngrok?
#30 opened by MhmadSal - 1
Domain does not work
#29 opened by GalloNero96 - 1
Embedded payload
#23 opened by davidcenoura - 1
Is there any way to communicate with CobaltStrike
#14 opened by resgz - 1
I'm getting an error Cannot convert 'System.Byte[]' to the type 'System.String' required by parameter 'Command'
#27 opened by EndCod3r - 1
how do i set a different port
#25 opened by lokzz - 1
- 2
Ngrok support
#20 opened by Perchant76 - 3
Error: Unable to connect to remote server
#21 opened by EndCod3r - 3
Invoke-WebRequest and Invoke-Expression
#15 opened by simonm2403 - 3
hoaxshell is picked up by Defender for Endpoint, alerts are triggered in Sentinel and activity can be audited in Defender 365 as a result
#11 opened by pr0b3r7 - 1
- 4
Don't use IE
#8 opened by moyvting - 1
- 2
Question ??
#7 opened by badi2nou9 - 3
Accidental Swastika
#1 opened by Narnillian - 3
Crashes when changing directory
#3 opened by pr0b3r7