PwnLnX is an advanced multi-threaded, multi-client python reverse shell for hacking Linux systems. There’s still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
Getting Started
Please follow these instructions to get a copy of PwnLnX running on your local machine without any problems.
Prerequisites
Installing
Download source code
git clone https://github.com/spectertraww/PwnLnX.git
cd Pwn LnX
chmod +x setup.sh
./setup.sh
Getting PwnLnx up and running
python3 PwnLnX.py –help
python3 PwnLnX.py –lhost [your localhost ip address] –lport [free port for listening incoming connections]
chmod +x PwnGen.sh
./PwnGen.sh
PwnLnx Usage
Command | Usage |
---|---|
help | show help |
exit | close all the sessions and quit the progaram. |
show sessions | show all available sessions from connected. |
session [ID] | interact with a specified session ID. |
kill [all/ID] | kill a specified session or all to kill all sessions. |
banner | have funny by changing the program banner |
Interact With A Session
Command | Usage |
---|---|
help | show help. |
quit | close the current session. |
background | background the current session. |
sysinfo | get minimum target system information. |
create_persist | create a persistant backdoor. |
upload | upload the specified filename to the target system. |
download | download the specified filename from the target system. |
screenshot | take a desktop screenshot of the target system. |
start_screenshare | start desktop screensharing. |
stop_screenshare | stop desktop screensharing. |
start_keycap | start capturing victim’s pressed keystrokes. |
dump_keycap | dump/get the captured keystrokes. |
stop_keycap | stop the capturing keystrokes. |
NB. you can also execute linux system commands besides those listed above.
Snapshots
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…