netpwn


Namenetpwn JSON
Version 1.4.post1 PyPI version JSON
download
home_pagehttps://github.com/anthares101/netpwn
SummaryA netcat listener alternative with automatic shell stabilization.
upload_time2023-05-03 10:24:57
maintainer
docs_urlNone
authorÁngel Heredia
requires_python>=3
licenseGPL-2.0
keywords windows macos linux shell reverse-shell tool hacking netcat tty pty cybersecurity reverse pwntools hacktoberfest kali
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            <img alt="Test status" src="https://img.shields.io/github/actions/workflow/status/anthares101/netpwn/ci.yml?style=for-the-badge"> <img alt="Version v1.4" src="https://img.shields.io/badge/version-v1.4-blue?style=for-the-badge"> <img alt="GPL-2.0 license" src="https://img.shields.io/github/license/anthares101/netpwn?style=for-the-badge">

# Netpwn - A netcat listener alternative

The idea of this Linux tool is to be an alternative to a Netcat listener but with the ability to determine if the received conection is a shell or not. If the conection is a shell Netpwn will also try to stabilize it to get a pty (Only Linux and MacOS shells).

## Installation

Just execute `pip3 install netpwn` and enjoy! You can use a virtual env or intall it system wide.

## Usage

```
Netpwn  - A netcat listener alternative

usage: netpwn [-h] [-v] [--no-pty] [-P LPORT]

A listener capable of stabilize Linux and MacOS reverse shells automatically

optional arguments:
  -h, --help            show this help message and exit
  -v, --version         show program's version number and exit
  --no-pty              if this flag is set, no shell stabilization is perform
  -P LPORT, --lport LPORT
                        the port used to listen for the reverse shell (Default: 8080)
```



            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/anthares101/netpwn",
    "name": "netpwn",
    "maintainer": "",
    "docs_url": null,
    "requires_python": ">=3",
    "maintainer_email": "",
    "keywords": "windows macos linux shell reverse-shell tool hacking netcat tty pty cybersecurity reverse pwntools hacktoberfest kali",
    "author": "\u00c1ngel Heredia",
    "author_email": "",
    "download_url": "https://files.pythonhosted.org/packages/ff/bc/e0ca935f4167aa439a3db25b6b91602a6501cf3fe2385ef5970253aff0dd/netpwn-1.4.post1.tar.gz",
    "platform": null,
    "description": "<img alt=\"Test status\" src=\"https://img.shields.io/github/actions/workflow/status/anthares101/netpwn/ci.yml?style=for-the-badge\"> <img alt=\"Version v1.4\" src=\"https://img.shields.io/badge/version-v1.4-blue?style=for-the-badge\"> <img alt=\"GPL-2.0 license\" src=\"https://img.shields.io/github/license/anthares101/netpwn?style=for-the-badge\">\n\n# Netpwn - A netcat listener alternative\n\nThe idea of this Linux tool is to be an alternative to a Netcat listener but with the ability to determine if the received conection is a shell or not. If the conection is a shell Netpwn will also try to stabilize it to get a pty (Only Linux and MacOS shells).\n\n## Installation\n\nJust execute `pip3 install netpwn` and enjoy! You can use a virtual env or intall it system wide.\n\n## Usage\n\n```\nNetpwn  - A netcat listener alternative\n\nusage: netpwn [-h] [-v] [--no-pty] [-P LPORT]\n\nA listener capable of stabilize Linux and MacOS reverse shells automatically\n\noptional arguments:\n  -h, --help            show this help message and exit\n  -v, --version         show program's version number and exit\n  --no-pty              if this flag is set, no shell stabilization is perform\n  -P LPORT, --lport LPORT\n                        the port used to listen for the reverse shell (Default: 8080)\n```\n\n\n",
    "bugtrack_url": null,
    "license": "GPL-2.0",
    "summary": "A netcat listener alternative with automatic shell stabilization.",
    "version": "1.4.post1",
    "project_urls": {
        "Homepage": "https://github.com/anthares101/netpwn",
        "Release notes": "https://github.com/anthares101/netpwn/releases"
    },
    "split_keywords": [
        "windows",
        "macos",
        "linux",
        "shell",
        "reverse-shell",
        "tool",
        "hacking",
        "netcat",
        "tty",
        "pty",
        "cybersecurity",
        "reverse",
        "pwntools",
        "hacktoberfest",
        "kali"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "f9d224d4e79c7afaa7b76e22cae1a3d6cbccbb1c537ab601edda264bb7aa2d81",
                "md5": "9a3789dcd2abff4b9509ecad28456793",
                "sha256": "e3027f9d1b570251318d57f30aafefd9da7deb0c78e05524b1672810308ea06b"
            },
            "downloads": -1,
            "filename": "netpwn-1.4.post1-py3.8.egg",
            "has_sig": false,
            "md5_digest": "9a3789dcd2abff4b9509ecad28456793",
            "packagetype": "bdist_egg",
            "python_version": "1.4.post1",
            "requires_python": ">=3",
            "size": 15519,
            "upload_time": "2023-05-03T10:24:55",
            "upload_time_iso_8601": "2023-05-03T10:24:55.923233Z",
            "url": "https://files.pythonhosted.org/packages/f9/d2/24d4e79c7afaa7b76e22cae1a3d6cbccbb1c537ab601edda264bb7aa2d81/netpwn-1.4.post1-py3.8.egg",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "6c490379213319c3c1bd2faa7b4badf8d3ba6b41b3c9c67645960a45f65932a5",
                "md5": "f31ce8ae78c1606bf0370ab9b677ea1a",
                "sha256": "af47f75ec9037a9ad6db51c6d7155e77047a2be582c55b008c4cc5c104cff8b0"
            },
            "downloads": -1,
            "filename": "netpwn-1.4.post1-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "f31ce8ae78c1606bf0370ab9b677ea1a",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3",
            "size": 14363,
            "upload_time": "2023-05-03T10:24:49",
            "upload_time_iso_8601": "2023-05-03T10:24:49.614031Z",
            "url": "https://files.pythonhosted.org/packages/6c/49/0379213319c3c1bd2faa7b4badf8d3ba6b41b3c9c67645960a45f65932a5/netpwn-1.4.post1-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "ffbce0ca935f4167aa439a3db25b6b91602a6501cf3fe2385ef5970253aff0dd",
                "md5": "fc903d8a9b99a4992d2f7ff15a3ce163",
                "sha256": "b2a0a9698b77f256da0cb5cbbb594265a7c10842dd908321593e6f8cd887ee0b"
            },
            "downloads": -1,
            "filename": "netpwn-1.4.post1.tar.gz",
            "has_sig": false,
            "md5_digest": "fc903d8a9b99a4992d2f7ff15a3ce163",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3",
            "size": 12106,
            "upload_time": "2023-05-03T10:24:57",
            "upload_time_iso_8601": "2023-05-03T10:24:57.543170Z",
            "url": "https://files.pythonhosted.org/packages/ff/bc/e0ca935f4167aa439a3db25b6b91602a6501cf3fe2385ef5970253aff0dd/netpwn-1.4.post1.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-05-03 10:24:57",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "anthares101",
    "github_project": "netpwn",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "lcname": "netpwn"
}
        
Elapsed time: 0.07006s