t3l3machus / hoaxshell

A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
BSD 2-Clause "Simplified" License
3.05k stars 482 forks source link

Error with -encodedcommand base64 #63

Closed anonymous300502 closed 8 months ago

anonymous300502 commented 8 months ago

I used the powershell-obfuscation-bible to use randomize-variable.py to obfuscate the normal http payload but after executing it isn't spawning the shell just hangs I ran it with powershell -e and it gives error in -encodedcommand base64 error I tried encoding it in base64 using $c = [system.text.encoding]::utf8.getstring([system.convert]::frombase64strong($c)) but then it gives error in hoaxshell terminal error decoding to utf8

anonymous300502 commented 8 months ago

I used the powershell-obfuscation-bible to use randomize-variable.py to obfuscate the normal http payload but after executing it isn't spawning the shell just hangs I ran it with powershell -e and it gives error in -encodedcommand base64 error I tried encoding it in base64 using $c = [system.text.encoding]::utf8.getstring([system.convert]::frombase64strong($c)) but then it gives error in hoaxshell terminal error decoding to utf8

Screenshot_2024-03-29-13-42-31-30_965bbf4d18d205f782c6b8409c5773a4.jpg

Screenshot_2024-03-29-13-42-25-36_965bbf4d18d205f782c6b8409c5773a4.jpg

Screenshot_2024-03-29-13-42-37-94_965bbf4d18d205f782c6b8409c5773a4.jpg

Screenshot_2024-03-29-13-42-34-34_965bbf4d18d205f782c6b8409c5773a4.jpg

anonymous300502 commented 8 months ago

I fixed all the errors and after obfuscation it's currently working on fully patched windows 11 with windows defender up and running as of 29th march 2024 15:42 IST

anonymous300502 commented 8 months ago

Solved