Skip to content

Latest commit

 

History

History
36 lines (29 loc) · 1.37 KB

README.md

File metadata and controls

36 lines (29 loc) · 1.37 KB

reversfy

Reverse Shell Generator Written In Ruby For Penetration Testers and Red Teamers

  _____                          __
 |  __ \                        / _|
 | |__) |_____   _____ _ __ ___| |_ _   _
 |  _  // _ \ \ / / _ \ '__/ __|  _| | | |
 | | \ \  __/\ V /  __/ |  \__ \ | | |_| |
 |_|  \_\___| \_/ \___|_|  |___/_|  \__, |
                                     __/ |
                                    |___/
 By @Hab1b0x

Installation

git clone https://github.com/hab1b0x/reversfy.git 
cd reversfy && bundle install 

Usage

ruby reverse.rb 

 Usage:                                  
   - Enter the IP address of the listener  
   - Enter the port number of the listener 
   - Select the shell      
Screen.Recording.2023-01-13.at.4.30.51.PM.mov

Notice

Please note that this script is only for educational purposes and should not be used for any malicious or unauthorized activities. The script simulates the creation of a reverse shell, which is a technique often used by attackers to gain remote access to a system. It is important to understand the potential risks and consequences of such techniques and use them responsibly and with proper authorization. It is also important to ensure that any systems you are working with are properly configured and secured to prevent unauthorized access.