Skip to content

reverse shell usb DigiSpark using board DigiKeyboard.h, command controlled with server TCP & UDP connections netcat listener on port 4444 (whatever port lol) and turn off anti virus windows

Notifications You must be signed in to change notification settings

akkbarrr/reverse-shell-usb-DigiSpark

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

Reverse Shell USB Digispark

english

reverse shell usb DigiSpark using board DigiKeyboard.h, command controlled with server TCP & UDP connections netcat listener on port 4444 (whatever port lol) and turn off anti virus windows

indonesia

reverse shell usb DigiSpark menggunakan board DigiKeyboard.h, perintah di kendalikan dengan server TCP & UDP connections netcat listener di port 4444 (whatever port lol) dan mematikan anti virus windows

Installation

  • Paste the following in the Additional Boards Manager URLs: box of the Preferences dialog box.
http://digistump.com/package_digistump_index.json
  • The image below shows the Additional Boards Manager URLs field of the Preferences dialog box. App Screenshot
  • In the Arduino IDE, use the top menu to navigate to Tools → Board → Boards Manager... to open the Boards Manager dialog box.

Type Digispark into the search field at the top of the Boards Manager dialog box that contains the text "Filter your search..." to easily find the Digispark package.

After filtering the packages, Digistump AVR Boards is displayed in the Boards Manager dialog box. Click the Install button at the bottom right of the Digistump item in the dialog box, as shown in the image below. App Screenshot When installation completes, click the Close button at the bottom right of the dialog box.

Usage

  • Run a netcat listener on your terminal :
nc -lp 4444
  • Go to Revershell Generator
  • Change the ip with your own ip listener and change the port to 4444 (or whatever u want)
  • And for the type, i'm using nc for the listener(whatever you have)
  • Choose your victim OS, for this i used to run the script in windows
  • Choose PowerShell #3 (Base64)
  • And copy the script
  • Download and edit the reverse_shell_Digi.ino DigiSpark and edit the output in ("powershell -e ") and paste your own costume Windows IP & PORT PowerShell(Base64) script, powershell script is hosted and compile and load reverse_shell_Digi.ino to your DigiSpark.

Plug in the DigiSpark and enjoy your reverse shell on the host machine! hope you all enjoy this script and as always use it responsibly!

Contributing

Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.

Please make sure to update tests as appropriate.

License

© Akbar IDN, SMK IDN Boarding School

About

reverse shell usb DigiSpark using board DigiKeyboard.h, command controlled with server TCP & UDP connections netcat listener on port 4444 (whatever port lol) and turn off anti virus windows

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages