Reverse Shell Tool
Project description
RST | Reverse Shell Tool
Description
Reverse Shell Tool by Mustansir Godhrawala. I created this tool to make the reverse shell process easier, rather than having to open pentest monkey's reverse shell cheatsheet and editing out the IP and PORT, the script will choose a random port and grab your IP and put it into your clipboard.
Heck we're even giving you options for listeners, you can use netcat or pwncat by Caleb Stewart and John Hammond for better post exploitation.
We'll create the payload and put it in your clipboard, and start the listener on our own too. All so you can spend your time pentesting rather than having to type quad 4 or 1234 again and again.
Run as sudo only.
Why use RST?
Dude making reverse shells is easy as f**k I mean I could go wherever I want copy the reverse shell..... aaahahahaha
Don't you see you have to go somewhere and copy shit and check the ip and what if you aren't pentesting with a vpn aaaaaaaaah
Let's take a look at a few scenarios and exactly how powerful reverse-shell-tool is....
- Install rst on my linux box?
pip3 install reverse-shell-tool
- Verify installation.
rst -v
Scenarios:
- Python reverse shell with pwncat listener using vpn ip?
rst -i v --lang py -l pwn
Breakdown:
- '-i' Specifies vpn ip
- '--lang' Specifies the language as py for valid shortforms see full documentation.
- '-l' Specifies the listener as pwncat
- Netcat reverse shell for an openbsd box with netcat listener using local ip?
rst -i l --lang nc
Breakdown:
- '-i' Specifies the local ip, valid shortforms as l,v,n for local, vpn and ngrok respectively.
- '--lang' Specifies the language as netcat, for valid shortforms see full documentation.
- '-l' Specifies the default as netcat so need to specify.
- Wanna do use case no 2 but have no vpn or local ip use? Use ngrok with the pyngrok library automate it with rst.
rst -i n --lang nc -n
Breakdown:
- '-i' Specifies the ngrok ip, valid shortforms as l,v,n for local, vpn and ngrok respectively.
- '--lang' Specifies the language as netcat, for valid shortforms see full documentation.
- '-l' Specifies the default as netcat so need to specify.
- '-n' Activates the ngrok library and does a one time installation of the binary.
Source install
- Clone the repo.
git clone https://github.com/mustansirgodhrawala/rst.git
- Change directory into repo
cd rst
- Run setup.py install
python3 setup.py install
(Running rst in a python virtual env is recommended)
Documentation
For in-depth documentation on how the tool works and advanced usage you can find information at Documentation.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file reverse-shell-tool-1.0.4.tar.gz
.
File metadata
- Download URL: reverse-shell-tool-1.0.4.tar.gz
- Upload date:
- Size: 10.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.0 CPython/3.9.2
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 81dbcf0532ebb6f0268fa70e7ee86f07bafa9e2a701ea82795cd644b466f63a4 |
|
MD5 | a6172dfcc21078b2b1dab0afcb0c4bd1 |
|
BLAKE2b-256 | f82a3d908537dc90dcfe661c4d376e201411c91f8d47816fcf99ebf3b8d22b44 |