Execute this file first. Must be on the attacker host. Acts as a listener. Obtains remote access while connected to client.py
.
Executes a shell on the target host. Need to be executed to open the connection. Will not work without the server.py
running.
- Both files are safe to install and run (given that you're using it only for testing purposes), Windows Defender does not classify these files as a threat.
- You can also push both files to an isolated network and test it there.
To test on two different hosts, (attacker vs. target) find this line in both files and change the server address 0.0.0.0
to your attacker's IP address.
host = sys.argv[1] if len(sys.argv) > 1 else '0.0.0.0' #server IP
Find this line in client.py
and comment it out:
print(f'[*] Receive: {cmd}')
#print(f'[*] Receive: {cmd}')
Do this only if you don't want the client to receive the output of the commands being used by the server.
Convert both scripts to .exe
to run it on Windows.
The objective of this program is to execute a reverse shell attack on vulnerable machines by establishing a remote interactive shell. The incremental changes I will be adding to this repo will focus more on writing scripts to automate payloads, as well as add minor changes/fix bugs.