Skip to content

This is an Arduino script for attiny85 digispark to get a reverse shell from your target. The script installs a payload on the target system that bypasses most AVs including windows defender and runs the payload to get a reverse shell. Works both locally and through internet ( with tunnelling through ngrok ).

License

Notifications You must be signed in to change notification settings

asadparkar/Reverse-Shell-Using-Digispark

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Reverse-Shell-Using-Digispark

Please use for ethical purposes only

Tested on Windows 10 and 11

  1. On your kali machine, start a socat listener on port 4444 using the following command: socat TCP-L:4444 -
  2. Start ngrok server that forwards connections to this local port ngrok tcp 4444
  3. Copy the IP and port that you got from ngrok.
  4. Download the payload.zip and unzip it.
  5. Inside the payload folder, edit the power.ps1 file. Edit the $command variable and chane the IP and port to the one's you got from ngrok.
  6. Zip the payload file and upload it to a server you can download it form.
  7. Inside the Reverse_Shell_Antivirus_Bypassed.ino, change the download link of your payload.zip.
  8. Uplolad the ino script into your digispark
  9. Insert it into a windows PC

And you should have your reverse shell.

For more details, you can read this article I wrote : https://medium.com/@asadparkar/hack-any-windows-computer-using-a-usb-gain-remote-shell-access-over-the-internet-4112aa484b94

or watch my video https://www.youtube.com/watch?v=4Kw-RFkrIX8&t=4s

About

This is an Arduino script for attiny85 digispark to get a reverse shell from your target. The script installs a payload on the target system that bypasses most AVs including windows defender and runs the payload to get a reverse shell. Works both locally and through internet ( with tunnelling through ngrok ).

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages