All Projects → panagiks → Rspet

panagiks / Rspet

Licence: mit
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Rspet

Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+188.84%)
Mutual labels:  hacking, pentesting, security-audit, backdoor
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-65.34%)
Mutual labels:  pentesting, backdoor, post-exploitation, reverse-shell
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+2584.06%)
Mutual labels:  pentesting, backdoor, post-exploitation, reverse-shell
Evilosx
An evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (+627.49%)
Mutual labels:  pentesting, backdoor, post-exploitation, reverse-shell
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-23.11%)
Mutual labels:  hacking, pentesting, post-exploitation, reverse-shell
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-25.9%)
Mutual labels:  hacking, backdoor, post-exploitation
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+295.22%)
Mutual labels:  hacking, backdoor, post-exploitation
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-27.49%)
Mutual labels:  hacking, pentesting, security-audit
Phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+373.31%)
Mutual labels:  hacking, backdoor, post-exploitation
Covertutils
A framework for Backdoor development!
Stars: ✭ 424 (+68.92%)
Mutual labels:  pentesting, post-exploitation, reverse-shell
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-75.3%)
Mutual labels:  hacking, pentesting, security-audit
Betterbackdoor
A backdoor with a multitude of features.
Stars: ✭ 195 (-22.31%)
Mutual labels:  pentesting, backdoor, reverse-shell
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-53.78%)
Mutual labels:  hacking, pentesting, security-audit
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+153.39%)
Mutual labels:  hacking, pentesting, backdoor
Habu
Hacking Toolkit
Stars: ✭ 635 (+152.99%)
Mutual labels:  hacking, pentesting, security-audit
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-43.43%)
Mutual labels:  hacking, backdoor, post-exploitation
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-86.06%)
Mutual labels:  backdoor, reverse-shell, pentesting
Archstrike
An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (+59.76%)
Mutual labels:  hacking, pentesting, security-audit
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+405.18%)
Mutual labels:  hacking, pentesting, post-exploitation
Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-46.22%)
Mutual labels:  hacking, pentesting, backdoor

RSPET

MIT Licence Python 2.7 v0.3.1 Maintained Twitter

RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.

DISCLAIMER: This software is provided for educational and PenTesting purposes and as a proof of concept. The developer(s) do not endorse, incite or in any other way support unauthorised computer access and networks disruption.

NOTE: min folder has been removed. The added overhead of maintaining two versions lead to min not receiving bug-fixes and important updates. If there is interest, both in using and maintaining, a more bare-bone and simplistic version, a new branch will be created to host it.

Current Version: v0.3.1

Follow: @TheRSPET on Twitter for updates.

Documentation : rspet.readthedocs.io

Features

  • Remote Command Execution
  • Trafic masking (XORed instead of cleartext); for better results use port 443[1]
  • TLS Encryption of the Server-Client communication
  • Built-in File/Binary transfer (both ways) over the masked Encrypted traffic
  • Built-in UDP Flooding tool
  • Built-in UDP Spoofing tool[2]
  • Multiple/All Hosts management; order File/Binary transfer and UDP Flood from Multiple/All connected Hosts
  • Modular Code Design to allow easy customization
  • Client script is tested and is compatible with PyInstaller (can be made into .exe)[3]
  • Full server side Plug-in support[4]
  • Plug-in management, including the ability to Install(Download) and Dynamically Load Plug-ins.
  • RESTful API for the Server Module

*[1]The idea for XORing as well as the skeleton for the client came from primalsecurity.net so if you like this pack of scripts you'll probably love what they do

*[2]UDP Spoofing uses RAW_SOCKETS so in order to utilize it, the client has to run on an OS that supports RAW_SOCKETS (most Unix-Based) and with root privileges. Finally, most of the ISPs have implementations in place that will either drop or re-structure spoofed packets

*[3]Again check primalsecurity.net's perfect blogpost about producing an .exe

*[4]Detailed documentation on creating Plug-ins available in Online Documentation!

Deployment:

  • rspet_server.py is situated at the attacker's machine and running to accept connections
  • rspet_client.py is situated in the infected machine(s) and will initiate the connection and wait for input.

Installation

Executing ./setup.py while on the project's root folder will generate the required certificates and install all needed components through pip.

Of course you can manually install the pip packages required by executing pip2 install Flask flask-cors. Also you can generate your own key-cert set (just name them server.key & server.crt and place them inside the Server folder).

Execution:

  • Server:
python rspet_server.py [-c #clients, --ip ipToBind, -p portToBind]

max_connections defaults to 5 if left blank

  • RESTful API:

    python rspet_server_api.py [-c #clients, --ip ipToBind, -p portToBind]
    
  • Client:

python rspet_client.py <server_ip> [server_port]

Many changes can be made to fit individual needs.

As always if you have any suggestion, bug report or complain feel free to contact me.

ASCIICAST

asciicast

Distros

A list of Distros that contain RSPET

As Featured in

Todo

  • [x] Fix logic bug where if a direct command to Host OS has no output Server displays command not recognized
  • [ ] Fix logic bug where if a direct command's to Host OS execution is perpetual the Server deadlocks
    • [ ] Investigate weather the issue resides in the Server logic or the linearity of the CLI.
  • [x] Add client version and type (min or full) as a property when client connects and at List_Hosts
  • [x] Add TLS encryption in order to:
    • [x] Replace XORing (and subsequently obfuscation with encryption)
    • [ ] Verify the "authenticity" of clients
      • [ ] A mechanism to issue and verify client certificates
      • [ ] A mechanism to recognize compromised client certs
  • [ ] Add client update mechanism (initial thought was the use of execv but it acts up)
  • [x] Add a Plug-in system to client (a more compact one)
  • [ ] Add remote installation of Plug-ins to client
  • [ ] Add installed Plug-ins report from client to server
  • [ ] Add UDP Reflection functionality
  • [ ] Provide more settings via config file
  • [ ] Re-introduce multythreading when handling multiple hosts.
  • [ ] Make commands available with 'Tab' automatically generated based on loaded Plug-ins.
  • [x] Fix logical bug when deleting a client. (Client still shows up on List_Hosts)
  • [x] Create comprehensive Plug-in creation guide.
  • [ ] Add support for command overridding in server plugins
  • [ ] Add dependency support for server plugins

Styleguide

This project is following Google's Python Styleguide with a minor variation on the use of whitespaces to align ":" tokens.

Contribution Opportunities

This project is open for contributors. If you have implemented a new feature, or maybe an improvement to the current code feel free to open a pull request. If you want to suggest a new feature open an issue. Additionally Testers are needed to run a few standard scenarios (and a few of their own maybe) to decrease the chance a bug slips into a new version. Should there be any interest about testing a beta branch will be created (where code to be tested will be uploaded) along with a list of scenarios. For a full guide on contribution opportunities and guides check out the "Contributing" chapter on RSPET's Online Documentation

Author - Project Owner/Manager

panagiks

Co-Author

dzervas -- Code (Server OO-redesign, Server Plug-in system implementation, bug reports, bug fixes)

Contributors

  • b3mb4m -- Code (tab.py and bug fixes)
  • junzy -- Docstings (udp_spoof & udp_spoof_send)
  • gxskar -- Documentation (ASCIICAST of RSPET's basic execution)
  • n1zzo -- Bug Report & Fix (PR #31)

License

MIT

Free Cake

                                   i.
                                   .7.
                                  .. :v
                                 c:  .x
                                  i.::
                                    :
                                   ..i..
                                  #MMMMM
                                  QM  AM
                                  9M  zM
                                  6M  AM
                                  2M  2MX#[email protected]
                                  0M  tMMMMMMMMMM;
                             .X#MMMM  ;MMMMMMMMMMMMv
                         [email protected]@
                   [email protected]
                  [email protected]@#$BWWB#@@#$WWWQQQWWWWB#@MM.
                  MM                                ;M.
                  $M                                EM
                  [email protected]@@@@@@@@@@@@@@@@@@@@@@@@@@@#OMM
                  #M                                cM
                  QM                                tM
                  MM                                CMO
               .MMMM                                oMMMt
              1MO 6MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM iMM
             .M1  BM                                VM  ,Mt
             1M   @M .............................. WM   M6
              MM  .A8OQWWWWWWWWWWWWWWWWWWWWWWWWWWW0Az2  #M
               MM                                      MM.
                @MMY                                vMME
                  UMMMbi                        i8MMMt
                     [email protected];;i.......i;XQMMMMMMt
                          ;[email protected];.
                          
                The Cake is a Lie. But it has been a Year :)
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].