skills/killvxk/malskills-zh/shellter/Gen Agent Trust Hub

shellter

Fail

Audited by Gen Agent Trust Hub on Apr 9, 2026

Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill provides specific command-line examples for running shellter.exe (directly or via Wine) to automate the process of backdooring legitimate executables like putty.exe.
  • [REMOTE_CODE_EXECUTION]: The skill facilitates the creation of malicious binaries by providing examples for injecting Metasploit payloads such as windows/meterpreter/reverse_tcp, which are designed to establish remote unauthorized control over a system.
  • [REMOTE_CODE_EXECUTION]: The documentation explicitly describes the process of "trojanizing" software to evade antivirus (AV) detection for "initial access," which is a high-risk activity involving the preparation of remote exploitation tools.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 9, 2026, 06:12 PM