项目作者: redcode-labs

项目描述 :
A script that automates generation of OpenSSL reverse shells
高级语言: Shell
项目地址: git://github.com/redcode-labs/Revssl.git
创建时间: 2019-07-14T20:48:10Z
项目社区:https://github.com/redcode-labs/Revssl

开源协议:MIT License

下载




Revssl


A simple Bash script that makes generation of OpenSSL reverse shells painless

Table of Contents

Introduction

Revssl was created mainly to automate the OpenSSL reverse shell idea @int0x33/day-43-reverse-shell-with-openssl-1ee2574aa998">from here, and pack it into a single
script. It can generate agents both for Linux and Windows, providing a secure and encrypted remote control channel. I am still working on OSX implementation.
This code isn’t perfect, so feel free to open new issues and contribute :D

Usage

  1. usage: revssl [-h] [-i] [-e <encryption>] [-d <days>] [-l <lhost>]
  2. [-p <lport>] [-k <keyname>] [-c <certname>] [-p <platform>]
  3. [-o] [-n <outfile>] [-s <domain>] [-r]
  4. options:
  5. -h Show help message
  6. -i Initiate listener in OpenSSL
  7. -e <encryption>
  8. Choose encryption type (default: rsa:4096)
  9. -d <days>
  10. Set certificates lifetime
  11. -l <lhost>
  12. Set listening host (default: 192.168.1.102)
  13. -p <port>
  14. Set listening port (default: 443)
  15. -k <keyname>
  16. Set name of generated key file (default: key.pem)
  17. -c <certname>
  18. Set name of generated cert file (default: cert.pem)
  19. -p <platform>
  20. Select agent platform (windows or linux, default: linux)
  21. -s <domain>
  22. Domain name for Windows Powershell agent (default: domain.xyz)
  23. -o Write agent to a file
  24. -n <outfile>
  25. Select name of the agent file (default: openssl_revshell)
  26. -r Remove generated certificates after established session

Screenshot



screenshot

License

This software is under MIT License