Con esta herramienta puedes generar comandos de shell inversa fáciles y sofisticados para ayudarte durante las pruebas de penetración.
Tabla de Contenido
Gorevpop Generate Reverse Shell
Auhor: Email an4kein: anakein@protonmail.ch
Descargar, Instalar y usar en Linux
➜ ~ cd /opt
➜ /opt git clone https://github.com/an4kein/gorevpop.git
Cloning into 'gorevpop'...
remote: Enumerating objects: 14, done.
remote: Counting objects: 100% (14/14), done.
remote: Compressing objects: 100% (11/11), done.
remote: Total 14 (delta 5), reused 9 (delta 2), pack-reused 0
Unpacking objects: 100% (14/14), 1.11 MiB | 27.00 KiB/s, done.
➜ /opt
➜ /opt cd gorevpop
➜ gorevpop git:(master) ✗ ls
bin LICENSE main.go README.md
➜ gorevpop git:(master) ✗ go run main.go
Gorevpop Generate Reverse Shell
-------------------------------
Author: an4kein
Email: anakein@protonmail.ch
With this tool you can generate easy and sophisticated reverse shell commands to help you during penetration tests.
Usage: .\gorevpop <payload> <ip> <port>
Example: .\gorevpop 1 127.0.0.1 1337
Payloads list:
1 - BASH REVERSE SHELL (option 1)
2 - BASH REVERSE SHELL (option 2)
3 - BASH REVERSE SHELL (option 3)
4 - PERL REVERSE SHELL (option 1)
5 - PERL REVERSE SHELL (option 2)
Usar en Windows
Dark Mode
gorevpop (este enlace se abre en una nueva ventana) por an4kein (este enlace se abre en una nueva ventana)
With this tool you can generate easy and sophisticated reverse shell commands to help you during penetration tests