Ihebski Rs Save

Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp

Project README

RS

Getting reverse shells with your IP has never been easier. How easy? ls easy! It's a fast way to read the default tun0 ip address, get the full list of Reverse Shell payloads,and listen using netcat on a port to get a shell back. Being used mainly for Hackthebox machines.

What did I changed?

Todo:

Let me know if you need to add new features, error handling, payloads or other funny messages.

screen_1

How to use:

Setup listening port only (the tool will read the VPN address on tun0 interface )

It's a must to install rlwrap for readline support. You'll thank me for that ;)

python3 rs.py 1234

IP & Port

python3 rs.py 127.0.0.1 1234

Advanced usage:

Follow the instructions bellow and get ready for some 0wn4g3

nano /bin/rs
#!/bin/bash
python3 /home/tools/rs/rs.py $1 $2
chmod +x /bin/rs

And finally:

rs 1234

Or

rs 127.0.0.1 1234
Open Source Agenda is not affiliated with "Ihebski Rs" Project. README Source: ihebski/rs
Stars
40
Open Issues
0
Last Commit
3 years ago
Repository

Open Source Agenda Badge

Open Source Agenda Rating