NEW IN V0.0.4
– RSPET_client.py and RSPET_client_min.py code cleanup
– RSPET_server.py and RSPET_server_min.py partially rewritten; Partial modularity achieved.
– RSPET_server.py and RSPET_server_min.py bug-fix when calling Make_File/Make_Binary with bad input
– Merge ALL and Select interfaces -Add UDP Reflection functionality
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
DISCLAIMER: This software is provided for educational purposes and as a proof of concept. The developer(s) do not endorse, incite or in any other way support unauthorised computer access and networks disruption.
NOTE : As of v0.0.3 folder min has been added. Since the new version has many more features not essential to the main functionality (a reverse shell that is), min will not recieve any more features beyond v0.0.3 and will only get bug and performance related fixes.
+ Remote Command Execution
+ Trafic masking (XORed insted of cleartext); for better results use port 443
+ Built-in File/Binary transfer (both ways) over the masked trafic
+ Built-in UDP Flooding tool
+ Multiple/All Hosts management; order File/Binary transfer and UDP Flood from Multiple/All connected Hosts
+ Client script is tested and is compatible with PyInstaller (can be made into .exe)
Usage is very simple, just:
git clone https://github.com/panagiks/RSPET && cd RSPET
cd server or min, RSPET Client & server include
git pull origin master