Skip to content

tukru/Reverse-Shell-Credential-Stealing-Python-Script

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

𖤐𖤐𖤐 Credential Thief 𖤐𖤐𖤐

Bored at work? ※ CHAOS ※

# Reverse-Shell-Credential-Stealing-Python-Script we play with fire here. Reverse Shell and Credential Stealing Script

This Python 3 script implements a reverse shell and credential stealing functionality. It allows an attacker to establish a reverse shell connection to a target machine and potentially steal login credentials. It should be noted that the usage of such code without proper authorization and adherence to applicable laws and ethical guidelines is strictly prohibited. Usage

To run the script, follow these steps:

Ensure you have Python 3 installed on your system.

Open a terminal or command prompt.

Navigate to the directory where the script is located.

Execute the following command:

python3 script.py

Follow the prompts to enter the required information.

Dependencies

This script requires the following Python modules:

os: Provides access to operating system functionalities.
socket: Enables network communication.
subprocess: Allows the creation and control of subprocesses.
getpass: Provides a secure way to retrieve user input without displaying it on the console.

Functionality

The script consists of the following major components:

Reverse Shell Function (reverse_shell)

This function establishes a reverse shell connection to an attacker's machine. It creates a socket, connects to the specified attacker's IP address and port, and creates a subprocess to execute commands. It redirects the input/output/error streams of the subprocess to the socket, enabling communication between the subprocess and the attacker. Finally, it waits for the subprocess to complete.

Steal Credentials Function (steal_credentials)

This function attempts to steal the user's login credentials. It uses the getpass module to retrieve the username and password of the current user. The implementation of credential validation and processing can be customized according to specific requirements. In the provided example, the obtained credentials are simply printed to the console.

Main Function (main)

This function serves as the entry point of the script. It prompts the user to input the attacker's IP address and port, as well as the remote host's IP address and port for receiving commands. It then calls the reverse_shell function to establish the reverse shell connection. Subsequently, it creates a socket and connects to the remote host. It receives a command from the remote host and executes it using the os.system() function. Finally, it calls the steal_credentials function to attempt credential stealing.

Security Considerations

It's crucial to emphasize that the functionalities provided by this script have serious security implications. Reverse shell connections and credential stealing are typically associated with malicious activities. It is essential to exercise extreme caution and utilize such code only with explicit authorization and for legitimate purposes.

Furthermore, the script as provided lacks proper error handling and security measures. It is strongly recommended to implement appropriate error handling, input validation, and encryption techniques when applying this code in real-world scenarios. Disclaimer

The authors of this script are not responsible for any unauthorized or malicious usage of the provided code. It is the responsibility of the user to ensure compliance with applicable laws and ethical guidelines.

Use this script responsibly, with proper authorization... if your a bitch

Made with ❤️ and chaos by tukru

About

we play with fire here.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages