Skip to content

Files to replicate trojan and reverseshell using the cloud along with other resources.

Notifications You must be signed in to change notification settings

nathansb2022/demo4everyone

Repository files navigation

demo4everyone

Disclaimer: Only for educational purposes only. An up-to-date example of how to create a trojan installer and utilize cloud infrastructure to host malicious files as well as control a victim machine.

Remember

Before testing, update your variables and directories in the files accordingly.

Rundown

  1. mcode: This directory has the peristence and revershell Powershell code.
  2. terraformscript: Contains the automagic way to create an s3 bucket in aws that can host files.
  3. CodeSignScript.txt: The code signing script that created from the link below to sign our malicious .exe file. Run as admin.
  4. demoC.txt: The text file that provides the steps portrayed in the youtube video to recreate the demo.
  5. mcode.txt: This is the CSharp code to merge with the media installer to initially establish our persistence.
  6. Last part of the youtube video demonstration shows teardown of the demo

Youtube Video

IMAGE ALT TEXT

Helpful Links

http://gphackingarticles.blogspot.com/2012/06/how-to-bind-two-exe-files-using-windows.html

https://adamtheautomator.com/how-to-sign-powershell-script/

AWS CLI Configuration

Terraform S3 Bucket Documentation

Powershell Reverseshell One-liner

About

Files to replicate trojan and reverseshell using the cloud along with other resources.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published