How to use ShellPop to achieve the 'fancy' pop-up of shells

0 20
In short, don't use .txt files to store your reverse shells anymore, it's just a...

How to use ShellPop to achieve the 'fancy' pop-up of shells

In short, don't use .txt files to store your reverse shells anymore, it's just a waste of time, ShellPop is definitely your best choice.

Tool installation

Since this tool is developed based on Python 2.7, we first need to install and configure the Python 2.7 environment on the local device.

Next, we need to use the following command to clone the source code of the project locally:

git clone https://github.com/0x00-0x00/ShellPop.git

Then switch to the project directory and use the following command to install other dependency components required by the tool:

root@kali# apt-get install python-argcomplete metasploit-framework -y

root@kali# pip install -r requirements.txt

Finally, execute the tool installation script:

root@kali# python setup.py install

Tool usage

View the tool help information:

root@kali# shellpop --help

View the available Shells in ShellPop:

root@kali# shellpop --list

Generate a Python TCP reverse shell (1.2.3.4:443):

Generate a PowerShell TCP Bind Shell (port 1337):

Variable renaming obfuscation:

IP address and port obfuscation:

Generate a Python TCP reverse shell (1.2.3.4:443) using URL encoding:

Generate a Python TCP reverse shell (1.2.3.4:443) using Base64 encoding, and set the corresponding decoder:

Generate a Python TCP reverse shell (1.2.3.4:443) using URL encoding + Base64 encoding:

Generate a PowerShell Bind Shell (port 1337) using Base64 encoding:

Generate a Python TCP reverse shell (1.2.3.4:443) using all encoding methods:

Generate a Shell using UDP protocol:

license agreement

The development and release of this project followMITOpen source license agreement.

Project address

ShellPop:【GitHub link

你可能想看:

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

Bubba AI launches open-source compliance platform Comp AI, helping 100,000 startups achieve security compliance

Enterprises have insufficient response capabilities, and the cybersecurity of the manufacturing industry faces severe challenges

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

Data security: Data does not land, presenting a variety of allure and resistance, half push and half pull

3.6 Should not use OS package manager update instructions such as apt-get update or yum update separately or on a single line in Dockerfile

Card farming and cashing out not only cause losses to banks but also disrupt financial order

(3) Is the national secret OTP simply replacing the SHA series hash algorithms with the SM3 algorithm, and becoming the national secret version of HOTP and TOTP according to the adopted dynamic factor

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

最后修改时间:
admin
上一篇 2025年03月29日 22:48
下一篇 2025年03月29日 23:10

评论已关闭