From 6d8995a98d08baf9b4786cc02b9d974f15dec5f2 Mon Sep 17 00:00:00 2001 From: NullArray Date: Fri, 1 Dec 2017 21:39:08 +0100 Subject: [PATCH] Update README.md --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index eebfaf3..d7bc5e3 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,4 @@ -#Shellware +# Shellware Upon execution Shellware will prompt for administrative privileges, once granted it wil copy itself to the C:\Users directory and add a registry entry for persistence. It will open port 8899 on the target machine and listen for a connection. Once a connection is established the program spawns an interactive OS shell. To make the program a little less suspiscious it might prudent to bind Shellware.exe to an innocent binary for deployment. @@ -7,11 +7,11 @@ to disable error reporting, system restore and tries to disable LUA. I've had mi been consistently succesful throughout testing on various platforms. -#Note +## Note The shellcode responsible for the operation of the bind shell can easily be replaced with shellcode for a Reverse TCP Shell or Meterpreter service by generating said payload with the Metasploit Framework. -#Usage +## Usage Compile the script to exe with pyinstaller and the program is ready for distribution.