Pentest Tools

Published on April 12th, 2016 📆 | 2762 Views ⚑

0

RSPET — Reverse Shell Post Exploitation Tool


iSpeech.org

RSPET (Reverse Shell Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.

Features

  • Remote Command Execution
  • Trafic masking (XORed insted of cleartext); for better results use port 443
  • Built-in File/Binary transfer (both ways) over the masked trafic
  • Built-in UDP Flooding tool
  • Multiple/All Hosts management; order File/Binary transfer and UDP Flood from Multiple/All connected Hosts
  • Modular Code Design to allow easy customization
  • Client script is tested and is compatible with PyInstaller (can be made into .exe)

 

 

Deployment:

  • RSPET_server.py or  RSPET_server_min.py is situated at the attacker’s machine and running to accept connections
  • RSPET_client.py or RSPET_client_min.py is situated in the infected machine(s) and will initiate the connection and wait for input.

[adsense size='1']

Execution:

  • Server:
python RSPET_server.py (max_connections)

max_connections defaults to 5 if left blank





  • Client:
python RSPET_client.py server_ip

 

Many changes can be made to fit individual needs.

 

Source && Download

https://github.com/panagiks/RSPET



Comments are closed.