Reverse Backdoor Windows! Help!!
by KillerMunna - Monday December 18, 2023 at 05:42 AM
#1
So guys I have a Python stub reverse shell payload.

When I execute the Python file in VS Code on my target computer it generates a stable backdoor to my machine.

But in reality no one is gonna execute .py files and so I tried to convert it to .exe using pyinstaller.

I used the command

pyinstaller --onefile --console stub.py

The problem is the .exe file generated opens up the command prompt and crashes immediately.

The result I get on my Kali machine is :
[*]192.168.75.1 - Meterpreter session 12 closed. Reason: Died

[-] Meterpreter session 12 is not valid and will be closed

Then a tried generating a Window based exe using
[*]

pyinstaller --onefile --windowed stub.py

On running .exe file I get following error:

https://ibb.co/YtWwtv9

With output on Kali Machine as:
[*]
[*]Sending stage (24768 bytes) to 192.168.75.1
[*]192.168.75.1 - Meterpreter session 14 closed. Reason: Died
[-] Meterpreter session 14 is not valid and will be closed

So, guys please help me in creating a stable executable file (.exe) so that I can generate a backdoor through it!
Reply
#2
You need to include all libs (static linking). Check the options in pyinstaller.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Cardable Giftcard Websites AKASHIC 10 316 5 hours ago
Last Post: fokfdo223
  Bypassing Modern AV (Metasploit Method) godco99 3 252 6 hours ago
Last Post: kosele6846
  Acunetix 23.7 lolol 37 7,197 Apr 29, 2026, 09:37 AM
Last Post: Usercomplex
  [FREE] Database Searcher Telegram odanbtw 1,004 80,451 Apr 24, 2026, 12:13 PM
Last Post: FAKE_NBOBN00
  ✅ Top 10 Google Dorks For SQL Injections NextSoftGroup 9 224 Apr 24, 2026, 02:54 AM
Last Post: elliotalderson4

Forum Jump:


 Users browsing this forum: 1 Guest(s)