PwnLnX is an advanced multi-threaded, multi-client python reverse shell for hacking Linux systems. There’s still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.
Getting Started
Please follow these instructions to get a copy of PwnLnX running on your local machine without any problems.
Prerequisites
Installing
Download source code
git clone https://github.com/spectertraww/PwnLnX.git
cd Pwn LnX
chmod +x setup.sh
./setup.sh
Getting PwnLnx up and running
python3 PwnLnX.py –help
python3 PwnLnX.py –lhost [your localhost ip address] –lport [free port for listening incoming connections]
chmod +x PwnGen.sh
./PwnGen.sh
PwnLnx Usage
| Command | Usage |
|---|---|
| help | show help |
| exit | close all the sessions and quit the progaram. |
| show sessions | show all available sessions from connected. |
| session [ID] | interact with a specified session ID. |
| kill [all/ID] | kill a specified session or all to kill all sessions. |
| banner | have funny by changing the program banner |
Interact With A Session
| Command | Usage |
|---|---|
| help | show help. |
| quit | close the current session. |
| background | background the current session. |
| sysinfo | get minimum target system information. |
| create_persist | create a persistant backdoor. |
| upload | upload the specified filename to the target system. |
| download | download the specified filename from the target system. |
| screenshot | take a desktop screenshot of the target system. |
| start_screenshare | start desktop screensharing. |
| stop_screenshare | stop desktop screensharing. |
| start_keycap | start capturing victim’s pressed keystrokes. |
| dump_keycap | dump/get the captured keystrokes. |
| stop_keycap | stop the capturing keystrokes. |
NB. you can also execute linux system commands besides those listed above.
Snapshots
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…
A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…