SuperShellAI
SuperShell AI is an advanced penetration testing tool that creates highly obfuscated PowerShell reverse shell payloads with integrated AI-powered evasion techniques. This tool leverages DeepSeek AI to generate polymorphic payloads that can bypass modern EDR (Endpoint Detection and Response) solutions and antivirus software.
Install / Use
/learn @badeeuzzaman/SuperShellAIREADME
SuperShellAI
<img width="201" height="66" alt="image" src="https://github.com/user-attachments/assets/466d6c58-3e82-486a-8a8d-1aa3aacdc5ea" />Description
SuperShellAI is an advanced penetration testing tool that creates highly obfuscated PowerShell reverse shell payloads with integrated AI-powered evasion techniques. This tool leverages DeepSeek AI to generate polymorphic payloads that can bypass modern EDR (Endpoint Detection and Response) solutions and antivirus software.
Features
🚀 AI-Powered Obfuscation: Utilizes DeepSeek AI to create advanced evasion techniques.
🔀 Multiple Payload Types: Support for standard PowerShell, Nishang-style, and CMD.exe reverse shells.
🛡️ EDR Evasion: Implements techniques like string splitting, encryption, and API unhooking.
🔄 Polymorphic Generation: Creates unique payload signatures with each generation.
💾 Export Options: Save payloads to files with customizable names.
📋 One-Liner Generation: Creates compact commands for easy execution.
Installation
- Clone the repository:
git clone https://github.com/badeeuzzaman/SuperShellAI.git
cd SuperShellAI
- Install required dependencies:
pip install -r requirements.txt
- Get a DeepSeek API key from https://platform.deepseek.com/
Usage
Run the script:
python supershellai.py
Follow the interactive prompts to:
- Enter your listener IP address and port
- Provide your DeepSeek API key
- Select generation mode (Basic, AI-powered, or Polymorphic)
- Choose shell type (PowerShell, Nishang, or CMD)
- Specify output filename
To test the payload.ps1, run on cmd:
powershell -ExecutionPolicy Bypass -File payload.ps1
Generation Modes
- Basic Obfuscation: Local obfuscation without API calls
- AI-Powered Obfuscation: Enhanced obfuscation using DeepSeek AI
- Polymorphic Generation: Completely unique payload generation using AI
Shell Types
- Standard PowerShell: Classic PowerShell reverse shell
- Nishang-style: Enhanced reverse shell with error handling
- CMD.exe: Traditional command prompt reverse shell
Ethical Use Disclaimer
This tool is designed for educational purposes and authorized penetration testing only. Users must ensure they have explicit permission before testing any systems. The developers are not responsible for misuse of this tool.
Legal Notice
Unauthorized use of this tool against systems without explicit permission is illegal. Always ensure you have proper authorization before conducting any security testing.
License
This project is licensed under the MIT License - see the LICENSE file for details.
Support
If you encounter any issues or have questions:
- Check the existing GitHub issues
- Create a new issue with detailed information
- Provide sample code and error messages if applicable
Screenshot
<img width="463" height="520" alt="image" src="https://github.com/user-attachments/assets/6bb12189-6dcb-487a-8824-20d3248bd013" />Related Skills
node-connect
343.3kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
92.1kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
343.3kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
343.3kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
