Defense-Evasion Reverse Shell for Penetration Testing
A lightweight reverse shell designed to bypass common security defenses
Shell-Custom is a custom-built reverse shell written in PowerShell that demonstrates defense-evasion techniques commonly encountered during penetration testing engagements. It provides a clean TCP reverse connection while avoiding detection by standard AV solutions.
- Defense Evasion — Bypasses common AV/EDR detection mechanisms
- Lightweight — Minimal footprint, no heavy dependencies
- Simple Listener — Works with standard
netcatas the listener - Windows Native — Built entirely with PowerShell, no external binaries required
nc -lvnp 4444Run the payload on the target system. The shell connects back to your listener.
Reverse Shell Connection:
Command Execution:
This tool is intended for authorized penetration testing and security research only. Unauthorized access to computer systems is illegal. Always obtain proper written authorization before testing. The author assumes no liability for misuse of this software.
For educational and authorized security testing purposes only.

