https://github.com/thenareshofficial/reverse-pyshell
Reverse-Python SHELL
https://github.com/thenareshofficial/reverse-pyshell
hack-windows python-shell
Last synced: 11 months ago
JSON representation
Reverse-Python SHELL
- Host: GitHub
- URL: https://github.com/thenareshofficial/reverse-pyshell
- Owner: theNareshofficial
- License: gpl-3.0
- Created: 2024-04-16T11:57:59.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2024-11-25T07:32:06.000Z (about 1 year ago)
- Last Synced: 2025-01-22T06:47:55.355Z (about 1 year ago)
- Topics: hack-windows, python-shell
- Language: Python
- Homepage:
- Size: 2.86 MB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
Welcome reverse-PYSHELL
This reverse-PYSHELL is a Python shell. I produced two files. 1.) File of the attacker 2.) Victim file: The target machine uses the victim file, while the Kali machine uses the attacker file. Configure your IP address, open both file sets containing the attackers' IP addresses, and change the default port (8080) before proceeding with this method. Once the victim file is shared with the target computer, you can begin working.
# Folder Tree
reverse-pySHELL/
├── LICENSE
├── README.md
├── assests
│ └── reverse-pySHELL.mp4
├── attacker.py
└── victim.py
# Testing
* Kali Linux
* Windows 11
# Installtions
```
# Clone repo
> git clone https://github.com/theNareshofficial/reverse-pySHELL.git
# Change Directory
> cd reverse-pySHELL
#open both file and set attacker IP address in Line 31
>nano attacker.py
# Execute the program
> python attacker.py
# After get shell
SHELL> pwd
SHELL> ls
#if you want to Exit
SHELL> exit
```