Skip to content

3xploit666/Shell-Custom

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

Shell-Custom

Defense-Evasion Reverse Shell for Penetration Testing

PowerShell Windows License: MIT

A lightweight reverse shell designed to bypass common security defenses


Overview

Shell-Custom is a custom-built reverse shell written in PowerShell that demonstrates defense-evasion techniques commonly encountered during penetration testing engagements. It provides a clean TCP reverse connection while avoiding detection by standard AV solutions.

Features

  • Defense Evasion — Bypasses common AV/EDR detection mechanisms
  • Lightweight — Minimal footprint, no heavy dependencies
  • Simple Listener — Works with standard netcat as the listener
  • Windows Native — Built entirely with PowerShell, no external binaries required

Quick Start

1. Start the Listener

nc -lvnp 4444

2. Execute the Shell

Run the payload on the target system. The shell connects back to your listener.

Screenshots

Reverse Shell Connection:

Screenshot-1.png

Command Execution:

Screenshot-2.png

Legal Disclaimer

This tool is intended for authorized penetration testing and security research only. Unauthorized access to computer systems is illegal. Always obtain proper written authorization before testing. The author assumes no liability for misuse of this software.

Author

@3xploit666


For educational and authorized security testing purposes only.

About

this is a simple shell that has the ability to bypass defenses

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors