HTTP2RevShell is a remote shell tool based on HTTP to control a victim through a Flask server and a TCP socket connection. This application allows you to send commands to the victim's machine and receive responses through a web interface.
- Connect to the victim via a socket on the specified port.
- Real-time communication through commands sent to the victim and displayed in the browser.
- Simple web interface to send commands and view responses.
- RESTful API to interact with the victim through HTTP requests.
- Python 3.x
- Flask
- Flask-CORS
You can install the necessary dependencies using pip:
pip install flask flask-corsYou can configure the victim connection ports and the Flask API with the following parameters:
--host: Server IP address (default0.0.0.0).--port: Port for the victim's data connection (default4444).--flask_host: Host for the Flask API (default0.0.0.0).--flask_port: Port for the Flask API (default8080).--timeout: Timeout for a client response (default1 second).
To run the application, use the following command:
python app.py --host <IP> --port <PORT> --flask_host <FLASK_HOST> --flask_port <FLASK_PORT> --timeout <TIMEOUT><IP>: Server IP address.<PORT>: Port where the server will listen to the victim.<FLASK_HOST>: Host where the Flask API will be available.<FLASK_PORT>: Port where the Flask API will be available.<TIMEOUT>: Timeout for a client response.
Access the web interface by visiting http://<FLASK_HOST>:<FLASK_PORT>/. From there you can send commands to the victim and view the responses in real-time.
Send a command to the victim. The request body should be a JSON with the command:
{
"command": "command_to_send"
}Get the status of the connection with the victim (connected or not).
This project is under the MIT License. See the LICENSE file for more details.
