An advanced multi-threaded, multi-client python reverse shell for hacking linux systems

Overview

PwnLnX

An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell should only be used in the lawful, remote administration of authorized systems. Accessing a computer network without authorization or permission is illegal.

📫 Reach me out!

Twitter Badge Mail Badge Mail Badge Mail Badge Mail Badge

Communities 🕵 🕵

Hang out with Xtreme Security family on Discord.

Discord

Getting Started

Please follow these instructions to get a copy of PwnLnX running on your local machine without any problems.

Prerequisites

  • Python3:
    • vidstream
    • pyfiglet
    • tqdm
    • mss
    • termcolor
    • pyautogui
    • pyinstaller
    • pip3
    • pynput

Installing

# Download source code
git clone https://github.com/OxTRAW/PwnLnX.git


cd PwnLnX

# download and  install the dipendences
chmod +x setup.sh

./setup.sh

Getting PwnLnx up and running

Show help

python3 PwnLnX.py --help

Listening for incoming connections

python3 PwnLnX.py --lhost [your localhost ip address] --lport [free port for listening incoming connections]

creating/Generating a payload

chmod +x PwnGen.sh

./PwnGen.sh

then follow the procedure to successifully create your payload, the payload is saved in PwnLnx directory. Send the created payload to victim

PwnLnx Usage

Command Usage
help show help
exit close all the sessions and quit the progaram.
show sessions show all available sessions from connected.
session [ID] interact with a specified session ID.
kill [all/ID] kill a specified session or all to kill all sessions.
banner have funny by changing the program banner

Interact with a session

Command Usage
help show help.
quit close the current session.
background background the current session.
sysinfo get minimum target system information.
create_persist create a persistant backdoor.
upload upload the specified filename to the target system.
download download the specified filename from the target system.
screenshot take a desktop screenshot of the target system.
start_screenshare start desktop screensharing.
stop_screenshare stop desktop screensharing.
start_keycap start capturing victim's pressed keystrokes.
dump_keycap dump/get the captured keystrokes.
stop_keycap stop the capturing keystrokes.

NB. you can also execute linux system commands besides those listed above.

Disclaimer

I will not be responsible for any direct or indirect damage caused due to the usage of this tool, it is for educational purposes only.

Report Bugs

[email protected]

Snapshots

You might also like...
All in One CRACKER911181's Tool. This Tool For Hacking and Pentesting. 🎭

All in One CRACKER911181's Tool. This Tool For Hacking and Pentesting. 🎭

Zero-attacker is an multipurpose hacking tool with over 12 tools
Zero-attacker is an multipurpose hacking tool with over 12 tools

Zero Attacker Zero Attacker is bunch of tools which we made for people.These all tools are for purpose of ethical hacking and discord tools. Who is th

Gmail Accounts Hacking

gmail-hack Gmail Accounts Hacking Gemail-Hack python script for Hack gmail account brute force What is brute force attack? In brute force attack,scrip

Installation of hacking tools

Tools-Spartan This is a program that makes it easy for you to download and install tools used in Kali Linux, there are tons of tools available.

WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.

wpdisect WpDisect is a wordpress hacking tool that finds misconfigurations in wordpress. Prerequisites You need to download wordpress in the wpdisect

This is tools hacking for scan vuln in port web, happy using
This is tools hacking for scan vuln in port web, happy using

Xnuvers007 PortInjection this is tools hacking for scan vuln in port web, happy using view/show python 3.9 solo coder (tangerang) 19 y/o installation

CC CAMERA HACKING TOOL

CAM-HACK CC CAMERA HACKING TOOL Installation On Termux $ apt update

labsecurity is a framework and its use is for ethical hacking and computer security
labsecurity is a framework and its use is for ethical hacking and computer security

labsecurity labsecurity is a framework and its use is for ethical hacking and computer security. Warning This tool is only for educational purpose. If

Chromepass - Hacking Chrome Saved Passwords
Chromepass - Hacking Chrome Saved Passwords

Chromepass - Hacking Chrome Saved Passwords and Cookies View Demo · Report Bug · Request Feature Table of Contents About the Project AV Detection Gett

Comments
  • Can't generate Payload.

    Can't generate Payload.

    After doing the setup.sh command I followed with the "Listening for incoming connections" commands, but then i couldn't generate a Payload because of "bash: chmod +x PwnGen.sh : command not found". I thought that maybe I should generate the Payload before the "Listening for incoming connections" commands so I did that, BUT it still didn't work. Error = ./PwnGen.sh: 1: Syntax error: "(" unexpected

    Can the creator or anyone else who knows the solution please help me. I've been trying to use programs like this nonstop for the past 3 days to no evail.

    Thanks in advance. And I wish you guys a happy NEWYEAR!

    opened by buhnropp 2
Owner
0xTRAW
A Network Engineering Student who is always learning. I Spend most of time coding some ethical hacking projects.
0xTRAW
Generate MIPS reverse shell shellcodes easily !

MIPS-Reverse MIPS-Reverse is a tool that can generate shellcodes for the MIPS architecture that launches a reverse shell where you can specify the IP

null 29 Jul 27, 2021
Meterpreter Reverse shell over TOR network using hidden services

Poiana Reverse shell over TOR network using hidden services Features -> Create a hidden service -> Generate non-staged payload (python/meterpreter_rev

calfcrusher 80 Dec 21, 2022
A simple multi-threaded distributed SSH brute-forcing tool written in Python.

OrbitalDump A simple multi-threaded distributed SSH brute-forcing tool written in Python. How it Works When the script is executed without the --proxi

K4YT3X 408 Jan 3, 2023
The Linux defender anti-virus software ported to work on CentOS Linux.

By: Seanpm2001, Et; Al. Top README.md Read this article in a different language Sorted by: A-Z Sorting options unavailable ( af Afrikaans Afrikaans |

Sean P. Myrick V19.1.7.2 2 Sep 12, 2022
The First Python Compatible Camera Hacking Tool

ZCam Hack webcam using python by sending malicious link. FEATURES : [+] Real-time Camera hacking [+] Python compatible [+] URL Shortener using bitly [

Sanketh J 109 Dec 28, 2022
A simple python code for hacking profile views

This code for hacking profile views. Not recommended to adding profile views in profile. This code is not illegal code. This code is for beginners.

Fayas Noushad 3 Nov 28, 2021
Collection Of Discord Hacking Tools / Fun Stuff / Exploits That Is Completely Made Using Python.

Venom Collection Of Discord Hacking Tools / Fun Stuff / Exploits That Is Completely Made Using Python. Report Bug · Request Feature Contributing Well,

PndaBoi 25 Dec 6, 2022
labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface

labsecurity labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface. Warning

Dylan Meca 16 Dec 8, 2022
The Easiest Way To Gallery Hacking

The easiest way to HACK A GALLARY, Get every part of your friends' gallery ( 100% Working ) | Tool By John Kener ????

John Kener 34 Nov 30, 2022
Sonoff NSPanel protocol and hacking information. Tasmota Berry driver for NSPanel

NSPanel Hacking Sonoff NSPanel protocol and hacking information and Tasmota Berry driver. NSPanel protocol manual Tasmota driver nspanel.be Installati

blakadder 98 Dec 26, 2022