An automated Python script that generates Windows Meterpreter reverse TCP payloads using msfvenom, serves them via Apache web server, and optionally launches a Metasploit listener - all with a simple interactive interface.
This tool is provided for educational purposes and authorized security testing ONLY.
Unauthorized access to computer systems, networks, or data is illegal under laws including:
- Computer Fraud and Abuse Act (CFAA) - USA
- Computer Misuse Act - UK
- Similar laws in other jurisdictions
By using this tool, you agree that:
- You will only test systems you own or have explicit written permission to test
- You assume all legal responsibility for your actions
- The author assumes no liability for misuse or damage caused by this tool
- π Auto IP Detection - Automatically detects your local IP address
- π― Interactive Prompts - User-friendly guided setup process
- π¦ One-Command Generation - Creates Windows executable payload instantly
- π Web Server Integration - Automatically starts Apache to host payload
- π§ Auto-Listener - Optional automatic Metasploit handler setup
- β‘ Fast & Lightweight - Minimal dependencies, runs in seconds
| Component | Requirement |
|---|---|
| OS | Kali Linux, Parrot OS, Ubuntu, Debian |
| RAM | 2GB minimum (4GB recommended) |
| Storage | 5GB free space |
| Python | 3.6 or higher |
| Network | Internet connection for downloads |
- Metasploit Framework (msfvenom, msfconsole)
- Apache2 web server
- Python 3
- Root/sudo access
# Run the below commands
git clone https://github.com/arsalan-pk/reversShell.git
cd reversShell
sudo python reversShell.py