Skip to content
/ rs Public

Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp

Notifications You must be signed in to change notification settings

ihebski/rs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

41 Commits
 
 
 
 

Repository files navigation

RS

Getting reverse shells with your IP has never been easier. How easy? ls easy! It's a fast way to read the default tun0 ip address, get the full list of Reverse Shell payloads,and listen using netcat on a port to get a shell back. Being used mainly for Hackthebox machines.

What did I changed?

Todo:

Let me know if you need to add new features, error handling, payloads or other funny messages.

screen_1

How to use:

Setup listening port only (the tool will read the VPN address on tun0 interface )

It's a must to install rlwrap for readline support. You'll thank me for that ;)

python3 rs.py 1234

IP & Port

python3 rs.py 127.0.0.1 1234

Advanced usage:

Follow the instructions bellow and get ready for some 0wn4g3

nano /bin/rs
#!/bin/bash
python3 /home/tools/rs/rs.py $1 $2
chmod +x /bin/rs

And finally:

rs 1234

Or

rs 127.0.0.1 1234

About

Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp

Topics

Resources

Stars

Watchers

Forks

Contributors 3

  •  
  •  
  •  

Languages