ReverseShellPy is a lightweight Python-based reverse shell designed for ethical hacking, red teaming, CTFs, and cybersecurity research. It features optional TLS encryption for secure communication between attacker and target systems.
- ✅ Plaintext and TLS-encrypted modes
- ✅ Minimal dependencies
- ✅ UNIX and Windows-compatible
- ✅ Easy-to-extend architecture
Generate self-signed TLS certs using OpenSSL:
openssl req -new -x509 -days 365 -nodes -out cert.pem -keyout key.pem🔒 Store these outside your project directory (e.g., ~/.reverse_shell_certs) and reference them securely via absolute paths or environment variables.
Run the listener:
python listener.pyRun the reverse shell from the target machine:
python reverse_shell.pyEnsure that you update the IP addresses properly before use.
reverse_shell/ ├── listener.py # TLS/Plaintext listener ├── reverse_shell.py # Client reverse shell payload └── README.md
This project is provided for educational purposes only. You are solely responsible for how you use this code. Use only on machines and networks you own or are explicitly authorized to test. Unauthorized access to computers or networks is illegal and unethical. The developers of this tool are not responsible for any misuse, damage, or legal consequences that result from using this software.
If you're unsure whether you have permission — you don't.
- OWASP Testing Guide: https://owasp.org/www-project-web-security-testing-guide/
- MITRE ATT&CK Framework: https://attack.mitre.org/
- NIST Cybersecurity Framework: https://www.nist.gov/cyberframework
Pull requests are welcome for improvements, especially around:
- Cross-platform payload support
- Detection evasion techniques (for legal red team use)
This project is licensed under the MIT License. See LICENSE for more details.