Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  

      Platypus v1.2.9 - A modern multiple reverse shell sessions manager written in go

      Recommended Posts


      Hidden Content

        Give reaction to this post to see the hidden content.


      A modern multiple reverse shell sessions/clients manager via terminal written in go


           Multiple service listening port
           Multiple client connections
           RESTful API
           Reverse shell as a service (Pop a reverse shell without remembering idle commands)
           Download/Upload file with progress bar
           Full interactive shell
               Using vim gracefully in reverse shell
               Using CTRL+C and CTRL+Z in reverse shell

      Changelog v1.2.9

          1. Add `Alias` command which gives a session a human friendly name
          2. Solve conflicts on the sessions from the same machine
          3. Direct nohup output to /dev/null

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post

      Link to post
      Share on other sites
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Bytecode Viewer v2.10.14 - Java 8 Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
          Bytecode Viewer is an Advanced Lightweight Java Bytecode Viewer, GUI Java Decompiler, GUI Bytecode Editor, GUI Smali, GUI Baksmali, GUI APK Editor, GUI Dex Editor, GUI APK Decompiler, GUI DEX Decompiler, GUI Procyon Java Decompiler, GUI Krakatau, GUI CFR Java Decompiler, GUI FernFlower Java Decompiler, GUI DEX2Jar, GUI Jar2DEX, GUI Jar-Jar, Hex Viewer, Code Searcher, Debugger and more.
          It’s written completely in Java, and it’s open source. It’s currently being maintained and developed by Konloch.
          There is also a plugin system that will allow you to interact with the loaded classfiles, for example, you can write a String deobfuscator, a malicious code searcher, or something else you can think of.
          You can either use one of the pre-written plugins or write your own. It supports groovy scripting. Once a plugin is activated, it will execute the plugin with a ClassNode ArrayList of every single class loaded in BCV, this allows the user to handle it completely using ASM.
          Code from various projects has been used, including but not limited to:
              J-RET by WaterWolf
              JHexPane by Sam Koivu
              RSynaxPane by Robert Futrell
              Commons IO by Apache
              ASM by OW2
              FernFlower by Stiver
              Procyon by Mstrobel
              CFR by Lee Benfield
              CFIDE by Bibl
              Smali by JesusFreke
              Dex2Jar by pxb1..?
              Krakatau by Storyyeller
              JD GUI/JD Core by The Java-Decompiler Team
              Enjarify by Storyyeller
          Key Features:
              Krakatau Integration for Bytecode assembly/disassembly.
              Smali/BakSmali Integration – You can now edit class files/dex files via smali!
              APK/DEX Support – Using Dex2Jar and Jar2Dex it’s able to load and save APKs with ease!
              Java Decompiler – It utilizes FernFlower, Procyon, and CFR for decompilation.
              Bytecode Decompiler – A modified version of CFIDE’s.
              Hex Viewer – Powered by JHexPane.
              Each Decompiler/Editor/Viewer is toggleable, you can also select what will display on each pane.
              Fully Featured Search System – Search through strings, functions, variables and more!
              A Plugin System With Built-In Plugins – (Show All Strings, Malicious Code Scanner, String Decrypters, etc)
              Fully Featured Scripting System That Supports Groovy.
              EZ-Inject – Graphically insert hooks and debugging code, invoke main and start the program.
              Recent Files & Recent Plugins.
              And more! Give it a try for yourself!
          Changelog v2.10.14
              Improved translations Thanks to @ThexXTURBOXx @TechComet @antonymcgreen @liuxilu @cn-fairy
              Added javap disassembler
              Automatic python path detection
              Improved plugin console
              Cleaned up settings dialogue
              Dynamic width Hex-Viewer
              Better resource handling
              Lots of code cleanup
              Patched a few Security Manager escapes
              Bug fixes and general improvements Thanks to @ThexXTURBOXx
              Bugs! Expect issues with this release, please report them!

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Evil-WinRM
          This shell is the ultimate WinRM shell for hacking/pentesting.
          WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators.
          This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff.
              Command History
              WinRM command completion
              Local files completion
              Upload and download files
              List remote machine services
              FullLanguage Powershell language mode
              Load Powershell scripts
              Load in memory dll files bypassing some AVs
              Load in memory C# (C Sharp) compiled exe files bypassing some AVs
              Colorization on output messages (can be disabled optionally)
          Changelog v3.0
              Remote files/directories autocomplete feature (Thanks to arale61)
              Added option to log commands and outputs to a log file (Thanks to Borch Cañavate)

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. YAPS – Yet Another PHP Shell
          As the name reveals, this is yet another PHP reverse shell, one more among hundreds available out there. It is a single PHP file containing all its functions and you can control it via a simple netcat listener (nc -lp 1337).
          In the current version, its main functions support only Linux systems, but I’m planning to make it work with Windows too.
              Single PHP file (no need to install packages, libs, or download tons of files)     Works with netcat, ncat, socat, multi/handler, almost any listener     Customizable password protection     No logs in .bash_history     Can do some enumeration         Network info (interfaces, iptables rules, active ports)         User info         List SUID and GUID files         Search for SSH keys (public and private)         List crontab         List writable PHP files     Auto download LinPEAS, LinEnum, or Linux Exploit Suggester     Write and run PHP code on a remote host     (Semi) Stabilize shell Cons
              Connection isn’t encrypted (yet) (nc does not support SSL)     Not fully interactive (although you can spawn an interactive shell with !stabilize)         CTRL+C breaks it; can’t use arrows to navigate (unless you use rlwrap nc -lp <ip> <port>)
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. GDA(GJoy Dex Analysizer)
          Most reverse engineers mainly use Java decompiler, commercial Dalvik decompiler Jeb, and smali2java to analyze Android APPs. Java decompiler is based on Java bytecode, including JD, JD-GUI, jadx, and others. smali2java is a decompiler based on the Smali code. They have their own shortcomings, such as the Java decompiler depends on the convert of dex2jar. For complex, obfuscated or packed apks, there is a problem of translation failure. smali2java decompiles Smali code which should be translated from DEX with apktool, so it increases the difficulty and error rate, and decreases the speed of manual analysis. In addition, their interaction is poor, which increases the difficulty of manual analysis. Although the commercial Jeb has better interactivity, it is easy to death when analyzing a large-sized APP with the Multidex, and it is very expensive for me…
          Changelog v3.95
              Fixed syntax error when executing a method

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Learn to use IDA Pro Free to do Reverse Engineering on Linux and Windows
          What you'll learn
              Reverse Engineering
              Assembly Language
              Remnux Linux IDA
              Windows IDA
              File, Strings and Hexeditor Analysis
              Converting Data, Renaming Labels and Variables
              Inserting Comments
              Creating Data Structures
              Decompiling Binary to C code
              Debugging using IDA
              Patching Files
              Register and Memory Analysis
              Python Scripting For Reversing Algorithms
              Creating Keygens
              Cracking Windows Crackmes
              Reversing Jumps
              Using NOPs to disable instructions
              Extending Trial Period beyond 30 days
              Intermodular Call Method
              Dynamic Analysis to Confirm Algorithms
              Linux and Windows API
              Algorithm Analysis and Testing
              Creating Keygens
              Setting breakpoints and stepping through code
              and more
              Basic Assembly Language , C Programming and Python would be useful
              Windows PC
              Familiar with basic Linux commands
          If you are a beginner to Reverse Engineering and want to learn how to use IDA Pro to reverse engineer and analyze Linux and Windows programs, then this is the course for you. In this course, you will a CTF (Capture The Flag) game -for Linux whilst learning reverse engineering. This makes learning fun and exciting.This will teach you all the basic skills for reversing on IDA, eg, how to rename labels, insert comments, convert data, create functions and analyze assembly code. We will use the Free version of IDA so that anyone can follow along without spending money to buy the Pro version. After that we will move to Windows and Reverse Engineer five Windows Crackme's.
          IDA Pro is one of the most widely used Disassembler for Reverse Engineering, Malware Analysis and Exploits analysis. In this course we will learn IDA by solving  Linux  and  windows CrackMe.  A CrackMe is a small program designed to test a programmer's reverse engineering skills. This course is an introduction to Reverse Engineering for anyone who wants to get started in this field. It is suitable for software developers who want to learn how software works internally. This course will equip you with the knowledge and skill to use IDA in addition to whatever other tools you might already be familiar with. It is also suitable for absolute beginners with no knowledge of reversing, as I will take you from zero to basics.
          I will start off with showing you how to install Oracle Virtual Box. Then, installing Remnux Linux in the Virtual Box followed by IDA for Linux. Then, we will reverse engineer Linux executable files. In a later section, we will move to installing IDA on Windows and continue learning how to reverse engineer windows files using IDA.
          By the end of this course, you will have the basic skills to start reversing and analyzing Linux and Windows binaries using IDA.
          What you will learn:
              How to disassemble programs into assembly code
              How to decompile programs to C code
              Static Analysis
              Dynamic Analysis using IDA's Debugger
              Patch files using IDA
              Understand Linux and Windows API's
              Identify entry points and functions
              Using NOPs and Reversing Jumps
              Reverse Crackmes and Patch them
              Learn to Assemble Instructions and Patch Bytes
              Algorithm Analysis and Testing
              Using Python to create solutions and keygens to crackmes
              and more
          Suitable for:
              Anyone interested to learn to use IDA for Reverse Engineering Linux  and Windows executable files.
              Students thinking of getting into Reverse Engineering or Malware Analysis as a Career Path
              Assembly Language, C Programming and Python would be helpful
              Windows PC
              Basic Linux Commands
          Who this course is for:
              Anyone interested to learn to use IDA for Reverse Engineering Linux & Windows executables
              Students thinking of getting into Reverse Engineering or Malware Analysis as a Carreer Path
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.