PyShell is Multiplatform Python WebShell. This tool helps you to obtain a shell-like interface on a web server to be remotely accessed. Unlike other webshells, the main goal of the tool is to use as little code as possible on the server side, regardless of the language used or the operating system of the server.
Thanks to this, you can use different types of shells (aspx, php, jsp, sh, py…) both in Windows and Linux, with command history, upload and download files and even, moving through directories as if it were a standard shell.
It is recommended to clone the complete repository or download the zip file. You can do this by running the following command:
git clone https://github.com/JoelGMSec/PyShell
Usage
./PyShell.py -h
██████ ▓██ ░██ ██████ ██░ ██ ▓█████ ██▓ ██▓
▓██░ ██▒██░ ██▒██ ▒ ▓██ ██▒▓██ ▓██▒ ▓██▒
▓██░ ██▒ ██ ██░░ ▓███ ▒██████░▒████ ▒██░ ▒██░
▒██████ ▒ ░████▓░ ▒ ██▒░██ ░██ ▒██ ▒██░ ▒██░
▒██▒ ░ ░ ░ ██▒▓░▒██████▒▒░██▒░██▓░█████▒░██████▒░██████▒
▒██░ ░ ░ ██▒▒▒ ▒ ▒▓▒ ▒ ░ ▒ ░░▒░▒░░ ▒░ ░░ ▒░▓ ░░ ▒░▓ ░
░▒ ░ ▓██ ░▒░ ░ ░▒ ░ ▒ ░ ░ ░ ░ ░ ░░ ░ ▒ ░░ ░ ▒ ░
░░ ░ ▒ ▒ ░░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░
░ ░ ░ ░ ░ ░ ░
————– by @JoelGMSec & @3v4Si0N —————
usage: pyshell.py [-h] [-a AUTH] [-c COOKIES] [-p PARAM] [-pi] [-su] [-ps] url method
positional arguments:
url Webshell URL
method HTTP Method to execute command (GET or POST)
optional arguments:
-h, –help show this help message and exit
-a AUTH, –auth AUTH Authorization header to use on each request
-c COOKIES, –cookies COOKIES
Cookie header to use on each request
-p PARAM, –param PARAM
Parameter to use with custom WebShell
-pi, –pipe Pipe all commands after parameter
-su, –sudo Sudo command execution (Only on Linux hosts)
-ps, –PowerShell PowerShell command execution (Only on Windows hosts)
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…