Skip to content

Attack payload examples for educational purpose only

Notifications You must be signed in to change notification settings

mahmutaymahmutay/PAYLOADS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 

Repository files navigation

PAYLOADS

Attack payload examples for educational purposes only

RSHELL ( Reverse Shell ): STEP-1 First, Attacker PC must be listening to the upcoming request,to accomplish this we use the LISTENER.py script which listens to port 8081 on localhost // IP and port changeable. image

STEP2- Execute RSHELL.py (reverse shell) payload in victim machine. Screenshot 2024-08-01 at 22 31 54

STEP3- Accessing the victim's machine by RSHELL payload we are in the victim's shell now and execute some commands on the attacker's pc within the victim's shell. Screenshot 2024-08-01 at 22 43 32

About

Attack payload examples for educational purpose only

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages