_____ _ _ ____ __ _____ _ _ _
| __ \ | | | | |___ \ / / / ____| | | | |
| |__) | _| |_| |__ ___ _ __ __) |/ /_| (___ | |__ ___| | |___
| ___/ | | | __| '_ \ / _ \| '_ \ |__ <| '_ \\___ \| '_ \ / _ \ | / __|
| | | |_| | |_| | | | (_) | | | |___) | (_) |___) | | | | __/ | \__ \
|_| \__, |\__|_| |_|\___/|_| |_|____/ \___/_____/|_| |_|\___|_|_|___/
__/ |
|___/
Python 3.6 Reverse and Bind Shells for Windows and Linux
The Windows Shells use subprocess.popen and are tested on Windows 10
The Linux ones use pty.spawn and are tested on Ubuntu 18.04
In order to use the shells, please modify the attacker IP address, set up the listener for the reverse shell or connect to the bind shell
This project is licensed under the GNU General Public License