RSPET - Reverse Shell and Post Exploitation Tool.

RSPET – Reverse Shell and Post Exploitation Tool.

RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.

DISCLAIMER: This software is provided for educational purposes and as a proof of concept. The developer(s) do not endorse, incite or in any other way support unauthorised computer access and networks disruption.

NOTE : As of v0.0.3 folder min has been added. Since the new version has many more features not essential to the main functionality (a reverse shell that is), min will not recieve any more features beyond v0.0.3 and will only get bug and performance related fixes.rspetFeatures:
+ Remote Command Execution
+ Trafic masking (XORed insted of cleartext); for better results use port 443[1]
+ Built-in File/Binary transfer (both ways) over the masked trafic
+ Built-in UDP Flooding tool
+ Multiple/All Hosts management; order File/Binary transfer and UDP Flood from Multiple/All connected Hosts
+ Client script is tested and is compatible with PyInstaller (can be made into .exe)[2]

CHANGELOG NEW IN V0.0.3
*Features:
– Built-in UDP Flood capabilities
– Multiple/All host managment; can now transfer Files/Binaries to Multiple/All connected host and order a UDP Flood
– Code cleanup; even more Chunks of code were moved into functions

Todo/Known Bugs:
– The current model dictates the server should wait for the completion of an excecuted command (when excecuting command directly to the client’s OS) so that any output can be sent to the server and be desplayed. This creates deadlocks when the executed command a) has no output or b) is a script/process ment to run endlessly

Usage is very simple, just:

Source: https://github.com/panagiks