# Persistence

## XSS

&#x20;[**JSShell**](https://github.com/Den1al/JSShell): An interactive multi-user web based javascript shell. It was initially created in order to debug remote esoteric browsers during experiments and research. This tool can be easily attached to XSS (Cross Site Scripting) payload to achieve browser remote code execution (similar to the BeeF framework).

[![asciicast](https://asciinema.org/a/217167.svg)](https://asciinema.org/a/217167)

&#x20;[**beef**](https://github.com/beefproject/beef):  BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.

## Webshell & Reverse shell

[**revshells.com**](https://www.revshells.com/)**:** generates your web/reverse shell payloads in a few clicks.

&#x20;[**shellerator**](https://github.com/ShutdownRepo/shellerator): Shellerator is a simple command-line tool aimed to help pentesters quickly generate one-liner reverse/bind shells in multiple languages (Bash, Powershell, Java, Python, etc).

![](/files/-MX2O92pEPo9DdHvcOZ_)

&#x20;[**weevely3**](https://github.com/epinna/weevely3)**:** Weaponized web shell.

```
weevely generate <password> <path>
weevely <URL> <password> [cmd]
```

### Execute Hidden Process

```
Start-Process -FilePath "c:\temp\example.bat" -WorkingDirectory "c:\temp" -WindowStyle Hidden
```


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://gitbook.seguranca-informatica.pt/tools/persistence.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
