A simple yet flexible cross-platform shell generator tool.
Name: G(Great) Shell
Description: A cross-platform shell generator tool that lets you generate whichever shell you want, in any system you want, giving you full control and automation.
If you find this tool helpful, then please give me a star as it tells me that I should add more features to it.
Is cross-platform, you can use it in operating systems such as:
- Unix-based systems
- GNU/Linux
- Windows
- macOS
Generates the following shells:
- Bind Shells: The target has a listening port and we connect to the target.
- Reverse Shells: We have a listening port and the target connects to us.
Supports the following encodings (as of now):
- URL Encoding: Bypass URL filters
- Base64/32/16 Encodings: Bypass string/keyword filters
- PowerShell Base64 Encoding
Supports the follow IP versions:
Supported protocols:
- TCP
- UDP
- ICMP
Note: You can add your own shells that use other protocols such as DNS.
Supports the following languages and tools:
- PowerShell
- Python
- Bash
- Sh
- Perl
- Socat
- Netcat
- Nc
- Awk
- Lua
- NodeJS
- OpenSSL
- PHP
- Ruby
- Telnet
- Golang
- C#
- Dart
- Groovy
- Many more…
It is limitless, feel free to add as many as you desire!
The shells are stored in markdown files as it makes it easy for everyone.
You can add more bind shells by adding markdown code blocks the following file:
shells/bind_shells.md
You can also add more reverse shells by adding markdown code blocks the following file:
shells/reverse_shells.md
These can be one-liners and multi-liners, it doesn’t matter. You can even add C# multi-liners code blocks if you want.
Example, replace the IP address and the port placeholders or variables values with these placeholders in your code:
$ip, $port
That’s it, now you can add more.
Note: It also offers advice and tips for performing and troubleshooting attacks.
This is the help menu:
<div class="highlight highlight-source-shell notranslate position-relative overflow-auto" data-snippet-clipboard-copy-content="❯ python3 gshell.py –help usage: gshell.py [-i ] [-p ] [-s ] [-r] [-b] [–base64] [–base32] [–base16] [–url] [–no-block] [–debug] [-l] [-a] [-h] ██████ ███████ ██ ██ ███████ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ███ ███████ ███████ █████ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██████ ███████ ██ ██ ███████ ███████ ███████ Generate bind shells and/or reverse shells with style Version: 1.0 Author: nozerobit Twitter: @nozerobit Options: -i , –ip Specify the IP address -p , –port Specify the port number -s , –shell Specify a shell type (python, nc, bash, etc) Payload Types: -r, –reverse Victim communicates back to the attacking machine -b, –bind Open up a listener on the victim machine Encoding Options: –base64 Add base64 encoding –base32 Add base32 encoding –base16 Add base16 encoding –url Add URL encoding Markdown Options: –no-block Skip “` code blocks “` while parsing Help Options: -l, –list List the available shell types -a, –advice Print advice and tips to get connections -h, –help Show this help message and exit”>
❯ python3 gshell.py --help
usage: gshell.py [-i <IP ADDRESS>] [-p <PORT NUMBER>] [-s <SHELL TYPE>] [-r] [-b]
[--base64] [--base32] [--base16] [--url] [--no-block] [--debug] [-l]
[-a] [-h]██████ ███████ ██ ██ ███████ ██ ██
██ ██ ██ ██ ██ ██ ██
██ ███ ███████ ███████ █████ ██ ██
██ ██ ██ ██ ██ ██ ██ ██
██████ ███████ ██ ██ ███████ ███████ ███████
Generate bind shells and/or reverse shells with style
Version: 1.0
Author: nozerobit
Twitter: @nozerobit
Options:
-i <IP ADDRESS>, --ip <IP ADDRESS>
Specify the IP address
-p <PORT NUMBER>, --port <PORT NUMBER>
Specify the port number
-s <SHELL TYPE>, --shell <SHELL TYPE>
Specify a shell type (python, nc, bash, etc)
Payload Types:
-r, --reverse Victim communicates back to the attacking machine
-b, --bind Open up a listener on the victim machine
Encoding Options:
--base64 Add base64 encoding
--base32 Add base32 encoding
--base16 Add base16 encoding
--url Add URL encoding
Markdown Options:
--no-block Skip ```
code
blocks
``` while parsing
Help Options:
-l, --list List the available shell types
-a, --advice Print advice and tips to get connections
-h, --help Show this help message and exit