<img alt="Test status" src="https://img.shields.io/github/actions/workflow/status/anthares101/netpwn/ci.yml?style=for-the-badge"> <img alt="Version v1.4" src="https://img.shields.io/badge/version-v1.4-blue?style=for-the-badge"> <img alt="GPL-2.0 license" src="https://img.shields.io/github/license/anthares101/netpwn?style=for-the-badge">
# Netpwn - A netcat listener alternative
The idea of this Linux tool is to be an alternative to a Netcat listener but with the ability to determine if the received conection is a shell or not. If the conection is a shell Netpwn will also try to stabilize it to get a pty (Only Linux and MacOS shells).
## Installation
Just execute `pip3 install netpwn` and enjoy! You can use a virtual env or intall it system wide.
## Usage
```
Netpwn - A netcat listener alternative
usage: netpwn [-h] [-v] [--no-pty] [-P LPORT]
A listener capable of stabilize Linux and MacOS reverse shells automatically
optional arguments:
-h, --help show this help message and exit
-v, --version show program's version number and exit
--no-pty if this flag is set, no shell stabilization is perform
-P LPORT, --lport LPORT
the port used to listen for the reverse shell (Default: 8080)
```
Raw data
{
"_id": null,
"home_page": "https://github.com/anthares101/netpwn",
"name": "netpwn",
"maintainer": "",
"docs_url": null,
"requires_python": ">=3",
"maintainer_email": "",
"keywords": "windows macos linux shell reverse-shell tool hacking netcat tty pty cybersecurity reverse pwntools hacktoberfest kali",
"author": "\u00c1ngel Heredia",
"author_email": "",
"download_url": "https://files.pythonhosted.org/packages/ff/bc/e0ca935f4167aa439a3db25b6b91602a6501cf3fe2385ef5970253aff0dd/netpwn-1.4.post1.tar.gz",
"platform": null,
"description": "<img alt=\"Test status\" src=\"https://img.shields.io/github/actions/workflow/status/anthares101/netpwn/ci.yml?style=for-the-badge\"> <img alt=\"Version v1.4\" src=\"https://img.shields.io/badge/version-v1.4-blue?style=for-the-badge\"> <img alt=\"GPL-2.0 license\" src=\"https://img.shields.io/github/license/anthares101/netpwn?style=for-the-badge\">\n\n# Netpwn - A netcat listener alternative\n\nThe idea of this Linux tool is to be an alternative to a Netcat listener but with the ability to determine if the received conection is a shell or not. If the conection is a shell Netpwn will also try to stabilize it to get a pty (Only Linux and MacOS shells).\n\n## Installation\n\nJust execute `pip3 install netpwn` and enjoy! You can use a virtual env or intall it system wide.\n\n## Usage\n\n```\nNetpwn - A netcat listener alternative\n\nusage: netpwn [-h] [-v] [--no-pty] [-P LPORT]\n\nA listener capable of stabilize Linux and MacOS reverse shells automatically\n\noptional arguments:\n -h, --help show this help message and exit\n -v, --version show program's version number and exit\n --no-pty if this flag is set, no shell stabilization is perform\n -P LPORT, --lport LPORT\n the port used to listen for the reverse shell (Default: 8080)\n```\n\n\n",
"bugtrack_url": null,
"license": "GPL-2.0",
"summary": "A netcat listener alternative with automatic shell stabilization.",
"version": "1.4.post1",
"project_urls": {
"Homepage": "https://github.com/anthares101/netpwn",
"Release notes": "https://github.com/anthares101/netpwn/releases"
},
"split_keywords": [
"windows",
"macos",
"linux",
"shell",
"reverse-shell",
"tool",
"hacking",
"netcat",
"tty",
"pty",
"cybersecurity",
"reverse",
"pwntools",
"hacktoberfest",
"kali"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "f9d224d4e79c7afaa7b76e22cae1a3d6cbccbb1c537ab601edda264bb7aa2d81",
"md5": "9a3789dcd2abff4b9509ecad28456793",
"sha256": "e3027f9d1b570251318d57f30aafefd9da7deb0c78e05524b1672810308ea06b"
},
"downloads": -1,
"filename": "netpwn-1.4.post1-py3.8.egg",
"has_sig": false,
"md5_digest": "9a3789dcd2abff4b9509ecad28456793",
"packagetype": "bdist_egg",
"python_version": "1.4.post1",
"requires_python": ">=3",
"size": 15519,
"upload_time": "2023-05-03T10:24:55",
"upload_time_iso_8601": "2023-05-03T10:24:55.923233Z",
"url": "https://files.pythonhosted.org/packages/f9/d2/24d4e79c7afaa7b76e22cae1a3d6cbccbb1c537ab601edda264bb7aa2d81/netpwn-1.4.post1-py3.8.egg",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "6c490379213319c3c1bd2faa7b4badf8d3ba6b41b3c9c67645960a45f65932a5",
"md5": "f31ce8ae78c1606bf0370ab9b677ea1a",
"sha256": "af47f75ec9037a9ad6db51c6d7155e77047a2be582c55b008c4cc5c104cff8b0"
},
"downloads": -1,
"filename": "netpwn-1.4.post1-py3-none-any.whl",
"has_sig": false,
"md5_digest": "f31ce8ae78c1606bf0370ab9b677ea1a",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3",
"size": 14363,
"upload_time": "2023-05-03T10:24:49",
"upload_time_iso_8601": "2023-05-03T10:24:49.614031Z",
"url": "https://files.pythonhosted.org/packages/6c/49/0379213319c3c1bd2faa7b4badf8d3ba6b41b3c9c67645960a45f65932a5/netpwn-1.4.post1-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "ffbce0ca935f4167aa439a3db25b6b91602a6501cf3fe2385ef5970253aff0dd",
"md5": "fc903d8a9b99a4992d2f7ff15a3ce163",
"sha256": "b2a0a9698b77f256da0cb5cbbb594265a7c10842dd908321593e6f8cd887ee0b"
},
"downloads": -1,
"filename": "netpwn-1.4.post1.tar.gz",
"has_sig": false,
"md5_digest": "fc903d8a9b99a4992d2f7ff15a3ce163",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3",
"size": 12106,
"upload_time": "2023-05-03T10:24:57",
"upload_time_iso_8601": "2023-05-03T10:24:57.543170Z",
"url": "https://files.pythonhosted.org/packages/ff/bc/e0ca935f4167aa439a3db25b6b91602a6501cf3fe2385ef5970253aff0dd/netpwn-1.4.post1.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2023-05-03 10:24:57",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "anthares101",
"github_project": "netpwn",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"lcname": "netpwn"
}