mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

9.6K
active users

#reverseshell

0 posts0 participants0 posts today
Hacker News<p>Malware found on NPM infecting local package with reverse shell</p><p><a href="https://www.reversinglabs.com/blog/malicious-npm-patch-delivers-reverse-shell" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">reversinglabs.com/blog/malicio</span><span class="invisible">us-npm-patch-delivers-reverse-shell</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://mastodon.social/tags/NPM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NPM</span></a> <a href="https://mastodon.social/tags/ReverseShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseShell</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/SoftwareDevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SoftwareDevelopment</span></a></p>
KrebsOnSecurity RSS<p>Hacker in Snowflake Extortions May Be a U.S. Soldier</p><p><a href="https://krebsonsecurity.com/2024/11/hacker-in-snowflake-extortions-may-be-a-u-s-soldier/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2024/11/ha</span><span class="invisible">cker-in-snowflake-extortions-may-be-a-u-s-soldier/</span></a></p><p> <a href="https://burn.capital/tags/Ne" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ne</span></a>'er-Do-WellNews <a href="https://burn.capital/tags/ConnorRileyMoucka" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConnorRileyMoucka</span></a> <a href="https://burn.capital/tags/telekomterrorist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telekomterrorist</span></a> <a href="https://burn.capital/tags/ALittleSunshine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ALittleSunshine</span></a> <a href="https://burn.capital/tags/TheComingStorm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheComingStorm</span></a> <a href="https://burn.capital/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a>-for-Hire <a href="https://burn.capital/tags/JohnErinBinns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JohnErinBinns</span></a> <a href="https://burn.capital/tags/cyb3rph4nt0m" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyb3rph4nt0m</span></a> <a href="https://burn.capital/tags/Kiberphant0m" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kiberphant0m</span></a> <a href="https://burn.capital/tags/Reverseshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Reverseshell</span></a> <a href="https://burn.capital/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://burn.capital/tags/SouthKorea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SouthKorea</span></a> <a href="https://burn.capital/tags/buttholio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>buttholio</span></a> <a href="https://burn.capital/tags/Proman557" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proman557</span></a> <a href="https://burn.capital/tags/Snowflake" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Snowflake</span></a> <a href="https://burn.capital/tags/Vars_Secc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vars_Secc</span></a> <a href="https://burn.capital/tags/Judische" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Judische</span></a> <a href="https://burn.capital/tags/Shi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Shi</span></a>-Bot <a href="https://burn.capital/tags/Verizon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verizon</span></a> <a href="https://burn.capital/tags/Boxfan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Boxfan</span></a> <a href="https://burn.capital/tags/Naver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Naver</span></a> <a href="https://burn.capital/tags/Waifu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Waifu</span></a> <a href="https://burn.capital/tags/ATT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ATT</span></a></p>
corbeaucrypto<p>Mon dieu - Penelope is alright! Probably my favorite <a href="https://infosec.exchange/tags/reverseshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseshell</span></a> catcher for <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> targets. <a href="https://github.com/brightio/penelope" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/brightio/penelope</span><span class="invisible"></span></a></p><p>Highly recommend!</p>
Teri Radichel<p>Chinese APT Abuses VSCode to Target Government in Asia</p><p>[TR: Wait what? VSCode has a reverse shell feature?! Turn this off. Sounds like something proposed by another large company’s dev team recently.] <a href="https://infosec.exchange/tags/devtools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devtools</span></a> <a href="https://infosec.exchange/tags/reverseshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseshell</span></a> <a href="https://infosec.exchange/tags/c2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>c2</span></a></p><p><a href="https://unit42.paloaltonetworks.com/stately-taurus-abuses-vscode-southeast-asian-espionage/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">unit42.paloaltonetworks.com/st</span><span class="invisible">ately-taurus-abuses-vscode-southeast-asian-espionage/</span></a></p>
loneicewolf<p>Hello!<br>I wanted to share 2 reverse shells I have made in C, for both Windows and Linux! It's only the source codes of them, non-compiled that is.</p><p>They are made with being as short as possible in mind, so they are not "fancy" in any way. </p><p>Contributions is ofc welcome! Reach out to me if you have any questions.<br>Have a nice day! I will leave the link to the GitHub Repo below.</p><p>- <a href="https://github.com/loneicewolf/ReverseShells" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/loneicewolf/Reverse</span><span class="invisible">Shells</span></a></p><p>*Hopefully they are useful :tuturu:​</p><p><a href="https://infosec.exchange/tags/reverseshells" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseshells</span></a> <a href="https://infosec.exchange/tags/reverseshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseshell</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a></p>
Harry Sintonen<p>I had a command injection vulnerability, but the target system didn't have netcat or other (obvious) means of getting a reverse shell. What to do? I wrote a minuscule "nc -e /bin/sh" in C + mips assembly, then wrote a small JavaScript stager that would encode the binary to a "echo -ne 'payload'" command that would then be used to drop the binary to /tmp, chmod it and execute with desired ip address and port. The nanonc tool <a href="https://sintonen.fi/src/nanonc/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sintonen.fi/src/nanonc/</span><span class="invisible"></span></a> supports both listen and connect back modes. The code calls linux kernel directly, doesn't use libc at all and has a custom startup code. The (low effort) stripped mipsel binary was 1372 bytes. I'm sure it could be made way way smaller, but this was well within reason already.</p><p>Was this total overkill and wholly unnecessary amount of work just to exploit this vulnerability? Yes. Did I learn a lot about mips platform, mips calling conventions and how to create tiny apps calling the linux kernel directly? Oh yes. <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitation</span></a> <a href="https://infosec.exchange/tags/tooling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tooling</span></a> <a href="https://infosec.exchange/tags/reverseshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseshell</span></a></p>
Brian Vermeer<p>Controlling your server with a reverse shell attack <a href="https://t.co/65HlGDRf9T" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">t.co/65HlGDRf9T</span><span class="invisible"></span></a><br><a href="https://mastodon.social/tags/reverseShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseShell</span></a> <a href="https://mastodon.social/tags/remoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>remoteCodeExecution</span></a> <a href="https://mastodon.social/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/devsecops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devsecops</span></a> <a href="https://t.co/LqKB3vOawI" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">t.co/LqKB3vOawI</span><span class="invisible"></span></a></p>
OPSEC Cybersecurity News Live<p>Reverse shell not working <br> <br> <a href="https://security.stackexchange.com/questions/267948/reverse-shell-not-working" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.stackexchange.com/que</span><span class="invisible">stions/267948/reverse-shell-not-working</span></a> <br> <br> <a href="https://aspiechattr.me/tags/reverseshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseshell</span></a> <a href="https://aspiechattr.me/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> <a href="https://aspiechattr.me/tags/docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>docker</span></a> <a href="https://aspiechattr.me/tags/netcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netcat</span></a> <a href="https://aspiechattr.me/tags/dvwa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dvwa</span></a></p>
Heckin Teagan :verified_trans:​:donor:🛩️<p>new shellgen be like</p><p><a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/ReverseShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseShell</span></a></p>
Astra Kernel :verified:<p>Writing reverse shell in <a href="https://infosec.exchange/tags/rustlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rustlang</span></a> :</p><p><a href="https://youtu.be/8pcg1k2BEho" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/8pcg1k2BEho</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/reverseshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseshell</span></a> <a href="https://infosec.exchange/tags/Exploit_Development" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit_Development</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a></p>