Skip to main content

Reverse Shell Tool

Project description

RST | Reverse Shell Tool

GitHub code size Documentation Status GitHub Build Status Code Coverage

Description

Reverse Shell Tool by Mustansir Godhrawala. I created this tool to make the reverse shell process easier, rather than having to open pentest monkey's reverse shell cheatsheet and editing out the IP and PORT, the script will choose a random port and grab your IP and put it into your clipboard.

Heck we're even giving you options for listeners, you can use netcat or pwncat by Caleb Stewart and John Hammond for better post exploitation.

We'll create the payload and put it in your clipboard, and start the listener on our own too. All so you can spend your time pentesting rather than having to type quad 4 or 1234 again and again.

Run as sudo only.

Why use RST?

Dude making reverse shells is easy as f**k I mean I could go wherever I want copy the reverse shell..... aaahahahaha

Don't you see you have to go somewhere and copy shit and check the ip and what if you aren't pentesting with a vpn aaaaaaaaah

Let's take a look at a few scenarios and exactly how powerful reverse-shell-tool is....

  1. Install rst on my linux box?
pip3 install reverse-shell-tool
  1. Verify installation.
rst -v

Scenarios:

  1. Python reverse shell with pwncat listener using vpn ip?
rst -i v --lang py -l pwn

Breakdown:

  • '-i' Specifies vpn ip
  • '--lang' Specifies the language as py for valid shortforms see full documentation.
  • '-l' Specifies the listener as pwncat

  1. Netcat reverse shell for an openbsd box with netcat listener using local ip?
rst -i l --lang nc

Breakdown:

  • '-i' Specifies the local ip, valid shortforms as l,v,n for local, vpn and ngrok respectively.
  • '--lang' Specifies the language as netcat, for valid shortforms see full documentation.
  • '-l' Specifies the default as netcat so need to specify.

  1. Wanna do use case no 2 but have no vpn or local ip use? Use ngrok with the pyngrok library automate it with rst.
rst -i n --lang nc -n

Breakdown:

  • '-i' Specifies the ngrok ip, valid shortforms as l,v,n for local, vpn and ngrok respectively.
  • '--lang' Specifies the language as netcat, for valid shortforms see full documentation.
  • '-l' Specifies the default as netcat so need to specify.
  • '-n' Activates the ngrok library and does a one time installation of the binary.

Source install

  1. Clone the repo.
git clone https://github.com/mustansirgodhrawala/rst.git
  1. Change directory into repo
cd rst
  1. Run setup.py install
python3 setup.py install

(Running rst in a python virtual env is recommended)

Documentation

For in-depth documentation on how the tool works and advanced usage you can find information at Documentation.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

reverse-shell-tool-1.0.4.tar.gz (10.2 kB view hashes)

Uploaded Source

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page