# Explanation:
This is Simple Python Reverse Shell module.
It is show how one can write a exploit and upload a malicious code to pyorg.
If installed how the attacker can get over your machine.
1. First Listen on 1234 port with netcat
`nc -lvp 1234`
2. Install the package
`pip install pip-remote-access`
#### Demo :
<a href=https://youtu.be/NOoJItXU9ps>
<img src="https://media4.giphy.com/media/GlXNuhLEjIUTAfIVpC/giphy.gif?cid=ecf05e47v0qmxkcev5dyurr35agj868z9j9nt3oglw2ed0k3&rid=giphy.gif&ct=s" width="100" height="50"/>
</a>
Raw data
{
"_id": null,
"home_page": "https://github.com/The-Robin-Hood/pip-remote-access",
"name": "pip-remote-access-test",
"maintainer": "",
"docs_url": null,
"requires_python": "",
"maintainer_email": "",
"keywords": "python,vulnerability,remoteaccess,sockets",
"author": "The-Robin-Hood (Ansari)",
"author_email": "",
"download_url": "https://files.pythonhosted.org/packages/51/5e/45c8a786b03abd82f0e133a8fca47eacd012fdbc73108db7ad9b1c1091a3/pip-remote-access-test-0.0.3.tar.gz",
"platform": null,
"description": "# Explanation:\r\n\r\nThis is Simple Python Reverse Shell module.\r\nIt is show how one can write a exploit and upload a malicious code to pyorg.\r\nIf installed how the attacker can get over your machine.\r\n\r\n1. First Listen on 1234 port with netcat\r\n`nc -lvp 1234`\r\n\r\n2. Install the package \r\n`pip install pip-remote-access`\r\n\r\n#### Demo :\r\n<a href=https://youtu.be/NOoJItXU9ps>\r\n<img src=\"https://media4.giphy.com/media/GlXNuhLEjIUTAfIVpC/giphy.gif?cid=ecf05e47v0qmxkcev5dyurr35agj868z9j9nt3oglw2ed0k3&rid=giphy.gif&ct=s\" width=\"100\" height=\"50\"/>\r\n</a>\r\n",
"bugtrack_url": null,
"license": "",
"summary": "To Show the vulnerability of the system",
"version": "0.0.3",
"project_urls": {
"Bug Tracker": "https://github.com/The-Robin-Hood/pip-remote-access/issues",
"Homepage": "https://github.com/The-Robin-Hood/pip-remote-access"
},
"split_keywords": [
"python",
"vulnerability",
"remoteaccess",
"sockets"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "515e45c8a786b03abd82f0e133a8fca47eacd012fdbc73108db7ad9b1c1091a3",
"md5": "45dd04e969ff1f0667887795e6f78180",
"sha256": "a04a5ecbfb92716c3f662bd51cef4a7c1a9ff1ad28a350e0cb6b3e4e4c6fa4eb"
},
"downloads": -1,
"filename": "pip-remote-access-test-0.0.3.tar.gz",
"has_sig": false,
"md5_digest": "45dd04e969ff1f0667887795e6f78180",
"packagetype": "sdist",
"python_version": "source",
"requires_python": null,
"size": 3509,
"upload_time": "2023-05-18T03:10:46",
"upload_time_iso_8601": "2023-05-18T03:10:46.536395Z",
"url": "https://files.pythonhosted.org/packages/51/5e/45c8a786b03abd82f0e133a8fca47eacd012fdbc73108db7ad9b1c1091a3/pip-remote-access-test-0.0.3.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2023-05-18 03:10:46",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "The-Robin-Hood",
"github_project": "pip-remote-access",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"lcname": "pip-remote-access-test"
}