RSPET v0.0.4 - Reverse Shell and Post Exploitation Tool.

RSPET v0.0.4 – Reverse Shell and Post Exploitation Tool.

NEW IN V0.0.4
– and code cleanup
– and partially rewritten; Partial modularity achieved.
– and bug-fix when calling Make_File/Make_Binary with bad input

**Todo/Known Bugs:
– Merge ALL and Select interfaces -Add UDP Reflection functionality

RSPET - Server

RSPET – Server

RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.

DISCLAIMER: This software is provided for educational purposes and as a proof of concept. The developer(s) do not endorse, incite or in any other way support unauthorised computer access and networks disruption.

NOTE : As of v0.0.3 folder min has been added. Since the new version has many more features not essential to the main functionality (a reverse shell that is), min will not recieve any more features beyond v0.0.3 and will only get bug and performance related fixes.

+ Remote Command Execution
+ Trafic masking (XORed insted of cleartext); for better results use port 443[1]
+ Built-in File/Binary transfer (both ways) over the masked trafic
+ Built-in UDP Flooding tool
+ Multiple/All Hosts management; order File/Binary transfer and UDP Flood from Multiple/All connected Hosts
+ Client script is tested and is compatible with PyInstaller (can be made into .exe)[2]


Usage is very simple, just:

Source: | Our Post Before