Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Reverse shell for CDT (CSEC 473)

GiaQM115/hellshell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HellShell

Reverse shell for CDT (CSEC 473)

HellShell is a Python interactive reverse shell using TCP sockets. Pipes can be opened on common ports, such as 80, 8080, 443, 20, 21, and 23. Pipes are torn down and re-established on new ports when an error occurs - like a broken pipe - and after a specified timeout from inactivity, for persistence's sake. Run the HellShell client on the victim machine, and when you're ready to open your HellShell, run the server on your machine. A connection will be established from the client side, trying all ports until an open one is found. Each session is written to a log file, for easy review of information you recover with HellShell.

Usage:

  • The attacker's machine needs red.py and logo to run
  • The victim machine only needs blue.py (this should probably be changed and hidden)
  • On the Client (Victim): python3 blue.py <server_ip>
  • On the Sever (Attacker): python3 red.py

Commands:

  • porthop - jump to the next port in the list, or wrap around
  • endme - gracefully close the shell and stop the server

About

Reverse shell for CDT (CSEC 473)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages