TinkererShell : A Simple Python Reverse Shell

TinkererShell is a simple python reverse shell written just for fun.

Simple reverse shell written in python 3.7 just for fun. Actually it supports Windows and Linux OS and integrates some basic features like keylogging and AES encrypted communications.

Supported operating systems:

  • Windows
  • Linux

Functions and characteristics:

  • Reverse connection.
  • AES encrypted communications.
  • Multithreaded.
  • Support multiple bots connected at the same time.
  • Keylogger.
  • Possibility to take screenshots of bot’s monitors.
  • Possibility to take pictures using bot’s webcam.
  • Possibility to steal bot’s clipboard’s content.
  • Possibility to enable or disable persistence (before payload delivery or later via remote control).
  • Possibility to enable or disable keylogger (before payload delivery or later via remote control).
  • Simple DNS spoofer (via hosts file).
  • Capability to upload and download files to and from the bot.

Also Read – GitGraber : Monitor GitHub To Search & Find Sensitive Data

TODO:

  • Thoroughly test persistence function on Linux.
  • Thoroughly test persistence function on Windows.
  • Add webcam stream and microphone recording (ideally streaming from bot and saving locally to master).

Disclaimer

This project is for educational purposes only. Don’t use it for illegal activities. I don’t support nor condone illegal or unethical actions and I can’t be held responsible for possible misuse of this software.

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 week ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

3 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

3 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

3 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

3 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

3 weeks ago