Skip to content

A script that automates generation of OpenSSL reverse shells

License

Notifications You must be signed in to change notification settings

redcode-labs/Revssl

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Revssl

A simple Bash script that makes generation of OpenSSL reverse shells painless

Table of Contents

Introduction

Revssl was created mainly to automate the OpenSSL reverse shell idea from here, and pack it into a single script. It can generate agents both for Linux and Windows, providing a secure and encrypted remote control channel. I am still working on OSX implementation. This code isn't perfect, so feel free to open new issues and contribute :D

Usage

usage: revssl [-h] [-i] [-e <encryption>] [-d <days>] [-l <lhost>]
              [-p <lport>] [-k <keyname>] [-c <certname>] [-p <platform>]
              [-o] [-n <outfile>] [-s <domain>] [-r]
options:
 -h     Show help message
 -i     Initiate listener in OpenSSL
 -e <encryption>
        Choose encryption type (default: rsa:4096)
 -d <days>
        Set certificates lifetime
 -l <lhost>
        Set listening host (default: 192.168.1.102)
 -p <port>
        Set listening port (default: 443)
 -k <keyname>
        Set name of generated key file (default: key.pem)
 -c <certname>
        Set name of generated cert file (default: cert.pem)
 -p <platform>
        Select agent platform (windows or linux, default: linux)
 -s <domain>
        Domain name for Windows Powershell agent (default: domain.xyz)
 -o     Write agent to a file
 -n <outfile>
        Select name of the agent file (default: openssl_revshell)
 -r     Remove generated certificates after established session

Screenshot

screenshot

License

This software is under MIT License

About

A script that automates generation of OpenSSL reverse shells

Topics

Resources

License

Stars

Watchers

Forks

Languages