This tool generates a powerful, obfuscated reverse shell payload using CMD + PowerShell, encoding the final payload in Base64 and using dynamic variable renaming for stealth and detection evasion. The goal is to produce a payload that can be executed directly via CMD with a high success rate in bypassing basic detection mechanisms.
Created and maintained by: luftwaffe66
- Single-mode payload: CMD + PowerShell + Base64
- Full obfuscation via randomized variable names
- Clean, minimal interaction
- Compatible with all modern Windows environments
- Automatically generates ready-to-execute CMD payload
- Python 3.x
- A target Windows machine
- A listener configured (e.g.,
nc -lvnp <port>or Metasploit multi/handler)
Clone the repository:
git clone https://github.com/1603160/Undetectable-Reverse-Shell-1.0.git
cd Undetectable-Reverse-Shell-1.0Run the generator using Python 3:
python3 generador.pyYou will be prompted for:
- Target IP or Hostname
- Port
The script will output a fully obfuscated, Base64-encoded reverse shell payload ready to execute directly via CMD.
- Memory-resident: No files dropped to disk
- Hidden execution: Launches silently without opening a visible PowerShell window
- Obfuscated: Random variable names and full Base64 encoding
- Customizable: Easy to embed in other payloads or attack chains
This project is licensed under the MIT License. See the LICENSE file for details.
This tool is provided for educational and authorized testing purposes only. The authors assume no responsibility for any misuse or damage caused by this software. Use it responsibly and only in environments where you have explicit permission to do so.
