reverse-shell-techniques
Fail
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: CRITICALCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill provides an extensive collection of one-liner payloads for over 20 languages and tools (including Bash, Python, Perl, Ruby, PHP, and Java) designed to establish reverse shell connections back to an attacker-controlled listener. Evidence found in SHELL_CHEATSHEET.md and SKILL.md.- [REMOTE_CODE_EXECUTION]: Detailed instructions are provided for executing remote code via PowerShell 'download cradles' (e.g., using
IEXwithNet.WebClient) and shell-based download-and-execute patterns. Evidence: Section 6 in SKILL.md.- [EXTERNAL_DOWNLOADS]: The skill documents multiple ways to fetch external payloads from remote servers using system utilities such ascertutil,bitsadmin,wget, andcurl. Evidence: Section 5 in SKILL.md.- [COMMAND_EXECUTION]: Provides specific commands for generating various malicious payloads (ELF, EXE, DLL, ASPX, JSP) using themsfvenomframework. Evidence: Section 7 in SKILL.md.
Recommendations
- CRITICAL: 1 infected file(s) detected - DO NOT USE
- AI detected serious security threats
Audit Metadata