Getting reverse shells with your IP has never been easier. How easy? ls easy! It's a fast way to read the default tun0 ip address, get the full list of Reverse Shell payloads,and listen using netcat on a port to get a shell back. Being used mainly for Hackthebox machines.
What did I changed?
- Migrate fork to python3.6+ and compact the output (Thanks to @t0nik0)
- Added multi choice based on https://github.com/0xprashant/Reverse-shell-Generator-
- Added more payloads
Let me know if you need to add new features, error handling, payloads or other funny messages.
python3 rs.py 1234
python3 rs.py 127.0.0.1 1234
Follow the instructions bellow and get ready for some 0wn4g3
nano /bin/rs
#!/bin/bash
python3 /home/tools/rs/rs.py $1 $2
chmod +x /bin/rs
And finally:
rs 1234
Or
rs 127.0.0.1 1234