{"id":18964541,"url":"https://github.com/waived/python-reverse-tcp","last_synced_at":"2025-09-06T06:45:17.690Z","repository":{"id":258386356,"uuid":"870388490","full_name":"waived/python-reverse-tcp","owner":"waived","description":"Reverse TCP shell written in Python ꟷ Remote shell execution","archived":false,"fork":false,"pushed_at":"2024-10-16T20:03:18.000Z","size":69,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2024-10-18T19:11:15.935Z","etag":null,"topics":["backdoor","python-backdoor","python-shell","remote-shell","reverse-shell","reverse-tcp-payload","reverse-tcp-shell","reverse-tcp-shells"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/waived.png","metadata":{"files":{"readme":"README.txt","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-10-10T00:27:22.000Z","updated_at":"2024-10-16T20:03:22.000Z","dependencies_parsed_at":"2024-10-18T19:21:24.152Z","dependency_job_id":null,"html_url":"https://github.com/waived/python-reverse-tcp","commit_stats":null,"previous_names":["waived/python-reverse-tcp"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/waived%2Fpython-reverse-tcp","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/waived%2Fpython-reverse-tcp/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/waived%2Fpython-reverse-tcp/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/waived%2Fpython-reverse-tcp/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/waived","download_url":"https://codeload.github.com/waived/python-reverse-tcp/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":239959981,"owners_count":19725221,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["backdoor","python-backdoor","python-shell","remote-shell","reverse-shell","reverse-tcp-payload","reverse-tcp-shell","reverse-tcp-shells"],"created_at":"2024-11-08T14:24:55.939Z","updated_at":"2025-02-21T05:22:21.685Z","avatar_url":"https://github.com/waived.png","language":"Python","funding_links":[],"categories":[],"sub_categories":[],"readme":"PYTHON SHELL:\n\nDescription:\n      Via a Reverse-TCP-connection, the 'server.py' controller can manage\n      multiple incoming-connections from devices infected with 'client.py'\n\n      Initially built with the intent of being used against Linux/Unix\n      environments, this script can easily be modified and used on \n      the Windows NT platforms as well.\n\nNote: There are no features/functions built into this shell. It only\n      functions as a raw terminal environment, either using SH, BASH,\n      or Command-Prompt statements. If said statements yield verbose\n      output to the user, the client.py backdoor will report the \n      output back to the attacker.\n\n      This shell CANNOT manage sessions with devices in a concurrent\n      manner, nor switch between sessions. This is a basic shell design\n      used for basic penetration testing / red teaming activities.\n\n      If used on a Windows NT platform, using AutoPyToExe (fouond at\n      https://pypi.org/project/auto-py-to-exe/) is a plausible option\n      for converting the client.py to a packaged non-dependent Windows\n      executable file.\n\nGood luck, and use responsibly!\n\n\n--- UPDATE ---\nAs of November 12th, this shell has been flagged by\nMicrosoft Windows Defender as \"VirTool:Python/Reveshesz.A\"\nObfuscation or modification of the client will be required\nfor a successful execution on the Windows NT platform.\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fwaived%2Fpython-reverse-tcp","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fwaived%2Fpython-reverse-tcp","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fwaived%2Fpython-reverse-tcp/lists"}