β˜„οΈ
Certified Ethical Hacker
Ctrlk
  • πŸ‘‰Certified Ethical Hacker Cheatsheet
  • 🐧General Settings
    • πŸ“¦APT Package Manager
    • πŸ€–Cron
    • 🦊Firefox Extensions
  • ✍️Research & Report
    • πŸ’ Obsidian
    • 🎒Notion
    • 🐼Pwndocs
  • πŸ”ŽInformation Gathering
    • πŸ“›NSLookup // Dig // Whois
    • πŸ“œNmap
    • πŸ–₯️DNS Enumeration
  • πŸ”¬Vulnerability Assessment
    • 🌐Web Assessment
    • πŸ•ΈοΈNetwork Assessment
  • βš”οΈExploitation
    • πŸ”΄Metasploit
    • 🐍MSFVenom
    • πŸ‘οΈSearchsploit
    • 🐚Revshells
    • 🐱Netcat
      • 😾Pwncat-CS
    • πŸ’ͺBrute Force
    • πŸ”’Wi-FI
  • ⚜️Post Exploitation
    • β›ΊPersistence
    • πŸ“File Transfer
    • πŸ•³οΈTunnelling
Powered by GitBook
On this page
  1. βš”οΈExploitation
  2. 🐱Netcat

😾Pwncat-CS

Python Command & Control through Netcat

LogoGitHub - calebstewart/pwncat: Fancy reverse and bind shell handlerGitHub
LogoBasic Usage - pwncat documentationpwncat.readthedocs.io

Usage

Change Platform to Windows

PreviousNetcatNextBrute Force

Last updated 2 years ago

# Connect to a bind shell
pwncat-cs connect://10.10.10.10:4444
pwncat-cs 10.10.10.10:4444
pwncat-cs 10.10.10.10 4444

# Listen for reverse shell
pwncat-cs bind://0.0.0.0:4444
pwncat-cs 0.0.0.0:4444
pwncat-cs :4444
pwncat-cs -lp 4444

# Connect via ssh
pwncat-cs ssh://user:[email protected]
pwncat-cs [email protected]
pwncat-cs user:[email protected]
pwncat-cs -i id_rsa [email protected]

# SSH w/ non-standard port
pwncat-cs -p 2222 [email protected]
pwncat-cs [email protected]:2222
# Reconnect utilizing installed persistence
#   If reconnection fails and no protocol is specified,
#   SSH is used as a fallback.

pwncat-cs reconnect://[email protected]
pwncat-cs reconnect://user@c228fc49e515628a0c13bdc4759a12bf
pwncat-cs [email protected]
pwncat-cs c228fc49e515628a0c13bdc4759a12bf
pwncat-cs 10.10.10.10
pwncat-cs -m windows 10.10.10.10 4444
pwncat-cs -m windows -lp 4444