-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathREADME.txt
33 lines (25 loc) · 1.35 KB
/
README.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
PYTHON SHELL:
Description:
Via a Reverse-TCP-connection, the 'server.py' controller can manage
multiple incoming-connections from devices infected with 'client.py'
Initially built with the intent of being used against Linux/Unix
environments, this script can easily be modified and used on
the Windows NT platforms as well.
Note: There are no features/functions built into this shell. It only
functions as a raw terminal environment, either using SH, BASH,
or Command-Prompt statements. If said statements yield verbose
output to the user, the client.py backdoor will report the
output back to the attacker.
This shell CANNOT manage sessions with devices in a concurrent
manner, nor switch between sessions. This is a basic shell design
used for basic penetration testing / red teaming activities.
If used on a Windows NT platform, using AutoPyToExe (fouond at
https://pypi.org/project/auto-py-to-exe/) is a plausible option
for converting the client.py to a packaged non-dependent Windows
executable file.
Good luck, and use responsibly!
--- UPDATE ---
As of November 12th, this shell has been flagged by
Microsoft Windows Defender as "VirTool:Python/Reveshesz.A"
Obfuscation or modification of the client will be required
for a successful execution on the Windows NT platform.