Skip to content

CronoX1/autoreverse

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

141 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Autoreverse

This tool configure different payloads so you don't have to do it manually.

Requirements

You will need to have "simple_colors" and "rlwrap" installed. If you don't have it, install it with this:

pip3 install simple_colors && sudo apt-get install rlwrap

Usage

Flag Description
-I, --interface Network interface of the IP address you want to configure in the payload
-i, --ip The IP address you want to configure in the payload.
-P, --port The port you want to use on the payload.
-p, --payload The payload you want to use (php, bash, nc, oldnc, exe, dll, ps1, elf, war, aspx, perl or python).
-l, --listener (optional) Create a listener on nc (netcat) or msf (meterpreter).
-a, --architecture (optional) Choose the architecture of the system (x86 = 32bits, x64 = 64bits) default value is x64.
-http, --httpserver (optional) Create an HTTP server to upload the file with command injection.

Example

autoreverse.py [-I] <network interface> [-i] <IP Address> -P <port> -p <payload> [-l] <listener> [-http] <http server port> [-a] <architecture>

alt text

NOTES

If you have any idea to improve it, let me know!!

About

This tool configure malicious payloads such as .exe, .dll, php and ps1 files.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages