reverse-shell-techniques

Fail

Audited by Gen Agent Trust Hub on Apr 9, 2026

Risk Level: CRITICALCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The skill provides an extensive collection of one-liner payloads for over 20 languages and tools (including Bash, Python, Perl, Ruby, PHP, and Java) designed to establish reverse shell connections back to an attacker-controlled listener. Evidence found in SHELL_CHEATSHEET.md and SKILL.md.- [REMOTE_CODE_EXECUTION]: Detailed instructions are provided for executing remote code via PowerShell 'download cradles' (e.g., using IEX with Net.WebClient) and shell-based download-and-execute patterns. Evidence: Section 6 in SKILL.md.- [EXTERNAL_DOWNLOADS]: The skill documents multiple ways to fetch external payloads from remote servers using system utilities such as certutil, bitsadmin, wget, and curl. Evidence: Section 5 in SKILL.md.- [COMMAND_EXECUTION]: Provides specific commands for generating various malicious payloads (ELF, EXE, DLL, ASPX, JSP) using the msfvenom framework. Evidence: Section 7 in SKILL.md.
Recommendations
  • CRITICAL: 1 infected file(s) detected - DO NOT USE
  • AI detected serious security threats
Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 9, 2026, 01:18 PM