Category Archives: Articles

What Shellter is…NOT!

I have seen crazy things being said online about this project. People talking about it without having any clue about what Shellter really is (doing).
The funniest thing about it, is when people actually blame the tool itself while they totally use it in the wrong way; feeding to the tool whatever might come to their head. NO KIDDING!

What Shellter is NOT:
i) packer
ii) crypter
iii) executable obfuscator
iv) whatever you think it is

Continue reading What Shellter is…NOT!

Using domain names as LHOST

A lot of people have been asking me to support domain names directly from Shellter in the LHOST parameter.
This is something that I am planning to implement in the upcoming version (v5.2) of Shellter. If you need this right now, then you can generate the payload in raw format from metasploit and feed it to Shellter.
However, this is also a good opportunity to make some things clear about setting domain names as LHOST parameter at the various payloads that support reverse connection back to the attacker’s server.
While some people might be aware of what actually happens in the background during the payload generation in metasploit regarding this matter, it also came to my attention that not everyone is.
Continue reading Using domain names as LHOST