Exploit Payload Reverse Shell Windows

CHAOS – Allow Generate Payloads and Control Remote Windows Systems.

CHAOS allow generate payloads and control remote Windows systems.

Disclaimer:

📚 This project was created only for learning purpose.

THIS SOFTWARE IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM.

Features:

  • Reverse Shell
  • Download File
  • Upload File
  • Screenshot 🆕
  • Keylogger 🆕
  • Persistence
  • Open URL Remotely
  • Get Operating System Name
  • Run Fork Bomb

Tested On Kali) Kali Linux – ROLLING EDITION

How To Use:

1. Install dependencies (You need Golang and UPX package installed)

2. Clone this repository

3. Get and install external imports (requirement to screenshot)

4. Maybe you will see the message “package github.com/lxn/win: build constraints exclude all Go files”.
It’s occurs because the libraries are to windows systems, but it necessary to build the payload.
Go into the repository

5. Run

 

Video Demo:

 

Download at Github

Post Comment

*

code

This site uses Akismet to reduce spam. Learn how your comment data is processed.