Skip to content

Latest commit

 

History

History
15 lines (8 loc) · 894 Bytes

README.md

File metadata and controls

15 lines (8 loc) · 894 Bytes

PAYLOADS

Attack payload examples for educational purposes only

RSHELL ( Reverse Shell ): STEP-1 First, Attacker PC must be listening to the upcoming request,to accomplish this we use the LISTENER.py script which listens to port 8081 on localhost // IP and port changeable. image

STEP2- Execute RSHELL.py (reverse shell) payload in victim machine. Screenshot 2024-08-01 at 22 31 54

STEP3- Accessing the victim's machine by RSHELL payload we are in the victim's shell now and execute some commands on the attacker's pc within the victim's shell. Screenshot 2024-08-01 at 22 43 32