An open API service indexing awesome lists of open source software.

https://github.com/nchgroup/shellgen

shellgen is a custom script that prints in prompt a lot of different reverse shells options with a given IP and PORT to copy and paste
https://github.com/nchgroup/shellgen

backdoor bind-shell linux php reverse-shell windows

Last synced: 5 months ago
JSON representation

shellgen is a custom script that prints in prompt a lot of different reverse shells options with a given IP and PORT to copy and paste

Awesome Lists containing this project

README

          

# shellgen
**shellgen** is a custom script that prints in prompt a lot of different reverse shells options with a given IP and PORT to copy and paste

# Supported
* Linux
* reverse
* bind
* Windows
* reverse
* download execute
* PHP Web Shell

# Usage

### Help

```
$ python3 shellgen.py -h
usage: shellgen.py [-h] {linux_rev,linux_bind,windows_rev,download_exec,php_shell} ...

options:
-h, --help show this help message and exit

subcommands:
{linux_rev,linux_bind,windows_rev,download_exec,php_shell}
linux_rev Linux reverse shells
linux_bind Linux bind shells
windows_rev Windows reverse shells
download_exec Windows shellcode generator for download and execute
php_shell PHP shells

Subcommand 'linux_rev':
usage: shellgen.py linux_rev [-h] [-s SHELLTYPE] -ip IPDST [-p PORTDST] [-r] [-e {b64,b64_utf16,url,durl,hex,json}]

options:
-h, --help show this help message and exit
-s SHELLTYPE, --shell SHELLTYPE
Type of shell
-ip IPDST, --ip IPDST
IP destination
-p PORTDST, --port PORTDST
Port destination
-r, --raw Raw payload
-e {b64,b64_utf16,url,durl,hex,json}, --encode {b64,b64_utf16,url,durl,hex,json}
Type of encoding => b64: base64, b64_utf16: base64_utf16, url: urlencode, durl: double_urlencode, hex: hexadecimal, json:
json_escape

Subcommand 'linux_bind':
usage: shellgen.py linux_bind [-h] [-s SHELLTYPE] [-p PORTSRC] [-r] [-e {b64,b64_utf16,url,durl,hex,json}]

options:
-h, --help show this help message and exit
-s SHELLTYPE, --shell SHELLTYPE
Type of shell
-p PORTSRC, --port PORTSRC
Port source
-r, --raw Raw payload
-e {b64,b64_utf16,url,durl,hex,json}, --encode {b64,b64_utf16,url,durl,hex,json}
Type of encoding => b64: base64, b64_utf16: base64_utf16, url: urlencode, durl: double_urlencode, hex: hexadecimal, json:
json_escape

Subcommand 'windows_rev':
usage: shellgen.py windows_rev [-h] -ip IPDST [-p PORTDST] [-r] [-e {b64,b64_utf16,url,durl,hex,json}]

options:
-h, --help show this help message and exit
-ip IPDST, --ip IPDST
IP destination
-p PORTDST, --port PORTDST
Port destination
-r, --raw Raw payload
-e {b64,b64_utf16,url,durl,hex,json}, --encode {b64,b64_utf16,url,durl,hex,json}
Type of encoding => b64: base64, b64_utf16: base64_utf16, url: urlencode, durl: double_urlencode, hex: hexadecimal, json:
json_escape

Subcommand 'download_exec':
usage: shellgen.py download_exec [-h] -u URL [-f {msf,hex,b64}] [-r]

options:
-h, --help show this help message and exit
-u URL, --url URL Url dropper
-f {msf,hex,b64}, --format {msf,hex,b64}
Type of format => msf: metasploit, hex: hexadecimal, b64: base64
-r, --raw Raw payload

Subcommand 'php_shell':
usage: shellgen.py php_shell [-h] [-m {request,get,post,REQUEST,GET,POST}] [-p PARAMETER] [-r] [-e {b64,b64_utf16,url,durl,hex,json}]

options:
-h, --help show this help message and exit
-m {request,get,post,REQUEST,GET,POST}, --method {request,get,post,REQUEST,GET,POST}
Type of method
-p PARAMETER, --parameter PARAMETER
Parameter ex: ?=whoami
-r, --raw Raw payload
-e {b64,b64_utf16,url,durl,hex,json}, --encode {b64,b64_utf16,url,durl,hex,json}
Type of encoding => b64: base64, b64_utf16: base64_utf16, url: urlencode, durl: double_urlencode, hex: hexadecimal, json:
json_escape
```

# References
* https://github.com/trustedsec/unicorn

# Colaborators
* Vay3t
* https://github.com/elborikua