Skip to content

Latest commit

 

History

History
16 lines (9 loc) · 501 Bytes

README.md

File metadata and controls

16 lines (9 loc) · 501 Bytes

reverse_tcp_shell

Spawn a reverse tcp shell

On attacker's machine:

python reverse_shell_attacker.py

Attacker keeps listening for a connection, once target executes reverse_shell_target.py, a shell from target's machine is opened to attacker. So, attacker can execute system commands as he wants, without any authentication.

On Target's machine:

python reverse_shell_target.py (put attacker's ip address in script)

NO CREDENTIALS REQUIRED :)

Please use this tool for EDUCATIONAL PURPOSE ONLY.