Pentest Tools
Published on April 12th, 2016 📆 | 2762 Views ⚑
0RSPET — Reverse Shell Post Exploitation Tool
RSPET (Reverse Shell Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Features
- Remote Command Execution
- Trafic masking (XORed insted of cleartext); for better results use port 443
- Built-in File/Binary transfer (both ways) over the masked trafic
- Built-in UDP Flooding tool
- Multiple/All Hosts management; order File/Binary transfer and UDP Flood from Multiple/All connected Hosts
- Modular Code Design to allow easy customization
- Client script is tested and is compatible with PyInstaller (can be made into .exe)
Deployment:
RSPET_server.py
orRSPET_server_min.py
is situated at the attacker’s machine and running to accept connectionsRSPET_client.py
orRSPET_client_min.py
is situated in the infected machine(s) and will initiate the connection and wait for input.
[adsense size='1']
Execution:
- Server:
python RSPET_server.py (max_connections)
max_connections defaults to 5 if left blank
- Client:
python RSPET_client.py server_ip
Many changes can be made to fit individual needs.
Source && Download
https://github.com/panagiks/RSPET
Gloss