Skip to content

apurvsinghgautam/HTTP-Reverse-Shell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 

Repository files navigation

HTTP-Reverse-Shell

https://img.shields.io/github/stars/apurvsinghgautam/HTTP-Reverse-Shell https://img.shields.io/github/forks/apurvsinghgautam/HTTP-Reverse-Shell

A reverse shell over HTTP (dodges deep packet inspection). Using Python 3 and no external dependencies needed.

Prerequisites

  • Python 3 (on both the attacker and the target machine

Usage

  1. Change ATTACKER_IP to the actual IP of the attacker on client.py
  2. Change ATTACKER_PORT on both client.py and server.py (or you can just use the default)
  3. Transfer client.py to the target machine
  4. Run server.py on the attacker machine
python3 server.py
  1. Run client.py on the target machine
python3 client.py
  1. Connection will be established