Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp
Getting reverse shells with your IP has never been easier. How easy? ls easy! It's a fast way to read the default tun0 ip address, get the full list of Reverse Shell payloads,and listen using netcat on a port to get a shell back. Being used mainly for Hackthebox machines.
What did I changed?
Let me know if you need to add new features, error handling, payloads or other funny messages.
python3 rs.py 1234
python3 rs.py 127.0.0.1 1234
Follow the instructions bellow and get ready for some 0wn4g3
nano /bin/rs
#!/bin/bash
python3 /home/tools/rs/rs.py $1 $2
chmod +x /bin/rs
And finally:
rs 1234
Or
rs 127.0.0.1 1234