Skip to main content

Reverse Shell Tool

Project description

RST | Reverse Shell Tool

GitHub code size Documentation Status GitHub Build Status Code Coverage

Description

Reverse Shell Tool by Mustansir Godhrawala. I created this tool to make the reverse shell process easier, rather than having to open pentest monkey's reverse shell cheatsheet and editing out the IP and PORT, the script will choose a random port and grab your IP and put it into your clipboard.

Heck we're even giving you options for listeners, you can use netcat or pwncat by Caleb Stewart and John Hammond for better post exploitation.

We'll create the payload and put it in your clipboard, and start the listener on our own too. All so you can spend your time pentesting rather than having to type quad 4 or 1234 again and again.

Run as sudo only.

Why use RST?

Dude making reverse shells is easy as f**k I mean I could go wherever I want copy the reverse shell..... aaahahahaha

Don't you see you have to go somewhere and copy shit and check the ip and what if you aren't pentesting with a vpn aaaaaaaaah

Let's take a look at a few scenarios and exactly how powerful reverse-shell-tool is....

  1. Install rst on my linux box?
pip3 install reverse-shell-tool
  1. Verify installation.
rst -v

Scenarios:

  1. Python reverse shell with pwncat listener using vpn ip?
rst -i v --lang py -l pwn

Breakdown:

  • '-i' Specifies vpn ip
  • '--lang' Specifies the language as py for valid shortforms see full documentation.
  • '-l' Specifies the listener as pwncat

  1. Netcat reverse shell for an openbsd box with netcat listener using local ip?
rst -i l --lang nc

Breakdown:

  • '-i' Specifies the local ip, valid shortforms as l,v,n for local, vpn and ngrok respectively.
  • '--lang' Specifies the language as netcat, for valid shortforms see full documentation.
  • '-l' Specifies the default as netcat so need to specify.

  1. Wanna do use case no 2 but have no vpn or local ip use? Use ngrok with the pyngrok library automate it with rst.
rst -i n --lang nc -n

Breakdown:

  • '-i' Specifies the ngrok ip, valid shortforms as l,v,n for local, vpn and ngrok respectively.
  • '--lang' Specifies the language as netcat, for valid shortforms see full documentation.
  • '-l' Specifies the default as netcat so need to specify.
  • '-n' Activates the ngrok library and does a one time installation of the binary.

Source install

  1. Clone the repo.
git clone https://github.com/mustansirgodhrawala/rst.git
  1. Change directory into repo
cd rst
  1. Run setup.py install
python3 setup.py install

(Running rst in a python virtual env is recommended)

Documentation

For in-depth documentation on how the tool works and advanced usage you can find information at Documentation.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

reverse-shell-tool-1.0.4.tar.gz (10.2 kB view details)

Uploaded Source

File details

Details for the file reverse-shell-tool-1.0.4.tar.gz.

File metadata

  • Download URL: reverse-shell-tool-1.0.4.tar.gz
  • Upload date:
  • Size: 10.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.0 CPython/3.9.2

File hashes

Hashes for reverse-shell-tool-1.0.4.tar.gz
Algorithm Hash digest
SHA256 81dbcf0532ebb6f0268fa70e7ee86f07bafa9e2a701ea82795cd644b466f63a4
MD5 a6172dfcc21078b2b1dab0afcb0c4bd1
BLAKE2b-256 f82a3d908537dc90dcfe661c4d376e201411c91f8d47816fcf99ebf3b8d22b44

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page