pwncat v0.1.2 releases: Netcat with Firewall/IPS evasion, bind/reverse shell

pwncat

pwncat

Netcat with Firewall and IPS evasion, bind and reverse shell, local and remote port-forward.

Motivation

Ever accidentally hit Ctrl+c on your reverse shell and it was gone for good? Ever waited forever for your client to connect back to you, because the Firewall didn’t let it out? Ever had a connection loss because an IPS closed suspicious ports? Ever were in need of port-forwarding, but you didn’t have SSH access?

This one got you covered.

Apart from that the current features of nc, ncat or socat just didn’t feed my needs and I also wanted to have a single tool that works on older and newer machines (hence Python 2+3 compat). Most importantly I wanted to have it in a language that I can understand and provide my own features with. (Wait for it, binary releases for Linux, MacOS, and Windows will come shortly).

⭐ Features

pwncat has many features, below is only a list of outstanding characteristics.

Feature Description
Bind shell Create bind shells
Reverse shell Create reverse shells
Proxy Local and remote port forwards without SSH
Ctrl+c protect A reverse shell can reconnect if you accidentally hit Ctrl+c
Detect Egress Scan and report open egress ports on the target
Evade FW Evade egress firewalls by round-robin outgoing ports
Evade IPS Evade Intrusion Prevention Systems by being able to round-robin outgoing ports on connection interrupts
UDP rev shell Try this with the traditional netcat
TCP / UDP Full TCP and UDP support
Python 2+3 Works with Python 2 and Python 3
Cross OS Should work on Linux, MacOS, and Windows as long as Python is available
Compatability Use the traditional netcat as a client or server together with pwncat

Changelog v0.1.2

Fixes

  • Fixes: #109 when pasting in raw mode it does not show full content until key is pressed

Install && Use