{"id":14976675,"url":"https://github.com/Devsebastian44/reverse-shell","last_synced_at":"2025-10-27T21:30:45.814Z","repository":{"id":184747870,"uuid":"672411690","full_name":"bl4ck44/reverse-shell","owner":"bl4ck44","description":"Reverse Shell indetectable para Windows 10","archived":false,"fork":false,"pushed_at":"2023-11-05T20:46:03.000Z","size":351,"stargazers_count":12,"open_issues_count":0,"forks_count":2,"subscribers_count":2,"default_branch":"master","last_synced_at":"2025-02-01T08:11:26.937Z","etag":null,"topics":["bash","bash-script","batch","batch-script","hacking","linux","python","python-script","python3","reverse-engineering","reverse-shell","shell","shell-script","shell-scripting","shell-scripts","shellscript","windows","windows-10","windows10"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/bl4ck44.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"License","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2023-07-30T01:55:59.000Z","updated_at":"2024-08-09T16:48:22.000Z","dependencies_parsed_at":null,"dependency_job_id":"2ce8a209-e0a0-453a-9189-9aa0c612db7e","html_url":"https://github.com/bl4ck44/reverse-shell","commit_stats":{"total_commits":21,"total_committers":1,"mean_commits":21.0,"dds":0.0,"last_synced_commit":"4b4bf58b46b7dc43d801e4a2fba21c4203fc5ba7"},"previous_names":["bl4ck44/reverse-shell"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/bl4ck44%2Freverse-shell","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/bl4ck44%2Freverse-shell/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/bl4ck44%2Freverse-shell/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/bl4ck44%2Freverse-shell/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/bl4ck44","download_url":"https://codeload.github.com/bl4ck44/reverse-shell/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":238560569,"owners_count":19492548,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["bash","bash-script","batch","batch-script","hacking","linux","python","python-script","python3","reverse-engineering","reverse-shell","shell","shell-script","shell-scripting","shell-scripts","shellscript","windows","windows-10","windows10"],"created_at":"2024-09-24T13:54:14.726Z","updated_at":"2025-10-27T21:30:45.806Z","avatar_url":"https://github.com/bl4ck44.png","language":"Python","readme":"# Reverse Shell\n\n\u003cp align=\"center\"\u003e\n\u003cimg src=\"Logotipo.png\"\u003e\n\u003c/p\u003e\n\nUna reverse shell (o \"shell inversa\") es una técnica utilizada en ciberseguridad y piratería informática que implica establecer una conexión entre un atacante y una máquina objetivo, permitiendo al atacante ejecutar comandos en la máquina remota de forma remota. Esta técnica es comúnmente utilizada por los hackers para obtener acceso no autorizado a sistemas informáticos y tomar el control de ellos.\n\n## Windows 10\n\n### Requisistos:\n\n* Python3\n\n* Visual Studio Code\n\nDescargar el resporitorio luego ejecutar el archivo **config.bat** para configurar la reverse shell, en windows 10.\n\n\n### Configuración\n\nPara configuirar la reverse shell para windows debes configurar la IP del atacante en el archivo **shell.py** al igual que debes configurar la IP para linux en el archivo **shell.sh**:\n\n\u003cp align=\"center\"\u003e\n\u003cimg src=\"./Img/config2.png\"\u003e\n\u003c/p\u003e\n\nLuego en nuestra maquina atacante **Linux** usaremos netcat para escuchar la conexión de la reverse shell mediante el puerto 4444.\n\n```nc\nnc -lvnp 4444\n```\n\n### ⚠️ **Aviso**\n\nEste script ha sido desarrollado únicamente con fines **educativos y de investigación en ciberseguridad**.\n\nNo me responsabilizo del mal uso que se pueda dar ni de los daños que puedan ocasionarse por su ejecución.\n\nEl uso indebido de este material puede ser **ilegal**.","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FDevsebastian44%2Freverse-shell","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FDevsebastian44%2Freverse-shell","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FDevsebastian44%2Freverse-shell/lists"}