Skip to content

Pop shells like a master with this Reverse/Bind shell generator.

Notifications You must be signed in to change notification settings

SouAquele/ShellPop

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

36 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ShellPop

Pop shells like a master

Installation

root@pc# ./install.sh

List available code for shells

user@pc$ shellpop --list

Image1

Generate code for RCE vulnerabilities

Guide / Manual

Types of Shell

There is two types of payloads in this program: Bind or Reverse.

Reverse Class

Reverse shells require, necessarily, --host and --port arguments.

Bind Class

Bind shells required, necessarily, only --port argument.

Command line examples

Generating a Python TCP reverse shell to IP 1.2.3.4 at port 443

Screenshot

Generating a Python TCP reverse shell to IP 1.2.3.4 at port 443 but using URL-encoding, suitable to use over HTTP protocol.

Screenshot

Generating a Python TCP reverse shell to IP 1.2.3.4 at port 443 but encode it to base64 and set-up a wrapper to decode it. This helps when quotes are troublesome.

Screenshot

Generating a Python TCP reverse shell to IP 1.2.3.4 at port 443 URL-encoded and encoded to base64 ... Yes, you know the drill!

Screenshot

Generating a Powershell bind shell over port 1337

Screenshot

Generating a Powershell bind shell over port 1337 encoded in base64

Screenshot

TCP is blocked but UDP is not? Let there be shells!

Screenshot

Credits

This code is 100% authored by Andre Marques (@zc00l) and it is made open to public the moment it was released in his github.

Any misuse of this code does not makes the author responsible for the damage it could cause.

If you want to add more commands or improve my program, feel free to send me a pull request.

About

Pop shells like a master with this Reverse/Bind shell generator.

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 94.7%
  • Shell 5.3%