So I played around with writing a reverse shell in python that can run on both Windows and Linux systems. This python reverse shell will connect back to a listener (NetCat is the only one I tested) and pass the received data into subprocess.Popen.
This reverse shell is focused on providing client-side functionality. The methods are called if the conditional statements are met. The conditional statements are simply looking for a string match within the data received from the server.
I’ve also tried to clean it up and make the standard reverse TCP shell look a little cleaner using a NetCat listener.
Thanks for your time!