https://github.com/ihebski/rs
Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp
https://github.com/ihebski/rs
hackthebox oscp-tools pentestmonkey python reverse-shell security-tools shell
Last synced: 10 months ago
JSON representation
Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp
- Host: GitHub
- URL: https://github.com/ihebski/rs
- Owner: ihebski
- Created: 2019-01-08T18:34:21.000Z (about 7 years ago)
- Default Branch: master
- Last Pushed: 2020-12-29T15:42:23.000Z (about 5 years ago)
- Last Synced: 2025-03-20T00:11:15.898Z (10 months ago)
- Topics: hackthebox, oscp-tools, pentestmonkey, python, reverse-shell, security-tools, shell
- Language: Python
- Homepage:
- Size: 35.2 KB
- Stars: 41
- Watchers: 3
- Forks: 22
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# RS
Getting reverse shells with your IP has never been easier.
How easy? ls easy!
It's a fast way to read the default tun0 ip address, get the full list of Reverse Shell payloads,and listen using netcat on a port to get a shell back.
Being used mainly for Hackthebox machines.
What did I changed?
- Migrate fork to python3.6+ and compact the output (Thanks to @t0nik0)
- Added multi choice based on https://github.com/0xprashant/Reverse-shell-Generator-
- Added more payloads
#### Todo:
Let me know if you need to add new features, error handling, payloads or other funny messages.

# How to use:
## Setup listening port only (the tool will read the VPN address on tun0 interface )
### It's a must to install rlwrap for readline support. You'll thank me for that ;)
```sh
python3 rs.py 1234
```
## IP & Port
```sh
python3 rs.py 127.0.0.1 1234
```
# Advanced usage:
Follow the instructions bellow and get ready for some 0wn4g3
```sh
nano /bin/rs
```
```sh
#!/bin/bash
python3 /home/tools/rs/rs.py $1 $2
```
```sh
chmod +x /bin/rs
```
And finally:
```sh
rs 1234
```
Or
```sh
rs 127.0.0.1 1234
```