Netcat feito em Python
Publicado por henrique (última atualização em 21/05/2022)
[ Hits: 3.673 ]
Homepage: naotem.com
Um netcat feito em python o nome da ferramenta é sptoolnet ele basicamente faz a mesma coisa que o netcat faz só que em Python.
#!/bin/python2
# -*- coding: utf-8 -*-
# pylint: disable-all
# flake8: noqa
import sys
import socket
import getopt
import threading
import subprocess
listen = command = upload = False
execute = target = upload_destination = ''
port = 0
# cores
red = "\033[1;31m"
blue = "\033[1;34m"
cyan = "\033[1;36m"
green = "\033[0;32m"
reset = "\033[0;0m"
bold = "\033[;1m"
reverse = "\033[;7m"
branco = "\033[37m"
gray = "\033[0;37m"
def usage():
print '-' * 80 + blue +'''
_______ _______ _______ _______ _______ ___ __ _ _______ _______
| || || || || || | | | | || || |
| _____|| _ ||_ _|| _ || _ || | | |_| || ___||_ _|
| |_____ | |_| | | | | | | || | | || | | || |___ | |
|_____ || ___| | | | |_| || |_| || |___ | _ || ___| | |
_____| || | | | | || || || | | || |___ | |
|_______||___| |___| |_______||_______||_______||_| |__||_______| |___|
spnet.py -t <host> -p <port>
-l, --listen (Busca em um host e porta especificada)
-e, --execute=<arquivo_para_iniciar> (Executa um arquivo pela conexão)
-c, --command (Inicializa um shell)
-u, --upload=<Destino> (Faz upload de um arquivo pela conexão)
exemplos:
echo -ne 'GET / HTTP/1.1\r\nHost: www.google.com\r\n\r\n' | ./spnet -t www.google.com -p 80
./spnet -l -p 9999 -c # first terminal
./spnet -t localhost -p 9999 # second terminal
'''.title() + reset + '-' * 80
def client_sender(buffer):
client = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
try:
client.connect((target, port))
if len(buffer):
client.send(buffer)
while True:
recv_len = 1
response = ''
while recv_len:
data = client.recv(4096)
recv_len = len(data)
response += data
if recv_len < 4096:
break
print response
buffer = raw_input('')
buffer += '\n'
client.send(buffer)
except:
print 'Exception. Exiting'
client.close()
def server_loop():
global target
if not len(target):
target = '0.0.0.0'
server = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
server.bind((target, port))
server.listen(5)
while True:
client_socket, address = server.accept()
client_thread = threading.Thread(
target=client_handler,
args=(client_socket,)
)
client_thread.start()
def run_command(cmd):
command = cmd.rstrip()
try:
output = subprocess.check_output(
command,
stderr=subprocess.STDOUT,
shell=True
)
except:
output = 'Failed to execute command\r\n'
return output
def client_handler(client_socket):
global upload, execute, command
if len(upload_destination):
file_buffer = ''
while True:
data = client_socket.recv(1024)
if not data:
break
else:
file_buffer += data
try:
file_descriptor = open(upload_destination, 'wb')
file_descriptor.write(file_buffer)
file_descriptor.close()
client_socket.send('Successfully saved file to {}\r\n'.format(upload_destination))
except:
client_socket.send('Failed to save file to {}\r\n'.format(upload_destination))
if len(execute):
output = run_command(execute)
client_socket.send(output)
if command:
while True:
client_socket.send('<MRH:#> ')
cmd_buffer = ''
while '\n' not in cmd_buffer:
cmd_buffer += client_socket.recv(1024)
response = run_command(cmd_buffer)
client_socket.send(response)
def main():
global listen, port, execute, command, upload_destination, target
if not len(sys.argv[1:]):
usage()
try:
opts, args = getopt.getopt(sys.argv[1:], 'hle:t:p:cu:', [
'help', 'listen', 'execute', 'target', 'port', 'command', 'upload'
])
except getopt.GetoptError as err:
print str(err)
usage()
for o, a in opts:
if o in ('-h', '--help'):
usage()
elif o in ('-l', '--listen'):
listen = True
elif o in ('-e', '--execute'):
execute = a
elif o in ('-c', '--command'):
command = True
elif o in ('-u', '--upload'):
upload_destination = a
elif o in ('-t', '--target'):
target = a
elif o in ('-p', '--port'):
port = int(a)
else:
assert False, 'Unhandled Option'
if not listen and len(target) and port > 0:
buffer = sys.stdin.read()
client_sender(buffer)
if listen:
server_loop()
main()
Shell reverso em Python - cliente
verifySite - um verificador de sites
Importar múltiplos hosts ZABBIX
Script para Scanner servidor e encontrar portas abertas
IA Turbina o Desktop Linux enquanto distros renovam forças
Como extrair chaves TOTP 2FA a partir de QRCODE (Google Authenticator)
Linux em 2025: Segurança prática para o usuário
Desktop Linux em alta: novos apps, distros e privacidade marcam o sábado
IA chega ao desktop e impulsiona produtividade no mundo Linux
Atualizando o Fedora 42 para 43
Como saber se o seu e-mail já teve a senha vazada?
Como descobrir se a sua senha já foi vazada na internet?
Mint Xfce não mantém a conexão no wi-fi (2)
Problemas com Driver NVIDIA (5)
Warcraft II Remastered no Linux? (8)









