Like the original implementation of netcat, when using TCP, pwncat * Feature is currently under development. Single file which only uses core packages - no external dependencies required. Use the netcat, ncat or socat as a client or server together with pwncat
Work on Linux, MacOS and Windows as long as Python is available Works with Python 2, Python 3, pypy2 and pyp圓 Stateful connect phase for UDP client modeĭual or single stack IPv4 and IPv6 support Scan and report open egress ports on the target (port hopping)Įvade egress firewalls by round-robin outgoing ports (port hopping)Įvade Intrusion Prevention Systems by being able to round-robin outgoing ports on connection interrupts (port hopping) Reverse shell can reconnect if you accidentally hit Ctrl+ c Local and remote port forward (Proxy server/client) Self-injecting mode to deploy itself and start an unbreakable reverse shell back to you automatically TCP und UDP port scanning with basic version detection support Featureįully scriptable with Pwncat Scripting Engine to allow all kinds of fancy stuff on send and receive Pwncat has many features, below is only a list of outstanding characteristics. Pwncat example: Port forwarding magic ⭐ Features At a glance # Same, but convert traffic on your end to UDP Unbreakable reverse shells - multiple shells
See in action unbreakable reverse shells - how to spawn
For more advanced techniques see ? Usage or ? Examples. This is just a quick get-you-started overview. (Wait for it, binary releases for Linux, MacOS and Windows will come shortly). Most importantly I wanted to have it in a language that I can understand and provide my own features with. Tool that works on older and newer machines (hence Python 2+3 compat). Integration tests run for multiple hours and break sporadically for various different reasons (network timeouts, unknown cancellations of GitHub Actions, etc): #735, #841Įver accidentally hit Ctrl+ c on your reverse shell and it was gone for good?Įver waited forever for your client to connect back to you, because the Firewall didn't let it out?Įver had a connection loss because an IPS closed suspicious ports?Įver were in need of a quick port forwarding?Īpart from that the current features of nc, ncat or socat just didn't feed my needs and I also wanted to have a single Failing builds do not indicate broken functionality. mypy type coverage (fully typed: 94.00%) Netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python ( PSE).