Skip to content

A DLL file created in C++ that allows you to get a reverse shell after hijacking a DLL process

License

Notifications You must be signed in to change notification settings

Starla2u/Rev_Hell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

Rev_Hell

  • Developed by BlackoutDev

A DLL file created in C++ that allows you to get a reverse shell after hijacking a DLL process. This is a great way to have persistence on a machine if you are doing a red team survey or a pen test.

This is a PoC program, do NOT use this for malicious purposes.

[How to setup]

To setup you will need to have Visual Studio set up on your system from here you can now begin the process of setting up Rev_Hell.

  • Firstly, create a Dynamic Link Library solution in Visual Studio. This can be found under the C++ section of VIsual Studio
  • Name your project and solution and once created copy and paste the code from the download rev_shell.cpp file you downloaded
  • Now you need to do some port forwarding. The easiest way to do this is via NGROK and creating a TCP session
  • Once you have this, you need to add the session IP into line 18 in your program where it says "127.0.0.1"
  • Now you also need to change the port in line 19 to the port you have port forwarded
  • Now build the solution and you have a .dll file that is ready to be deployed on your red team engagement

About

A DLL file created in C++ that allows you to get a reverse shell after hijacking a DLL process

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages