~ Aug - 13 - 2023
SecureShell Remote Admin is a secure remote administration tool designed for ethical cybersecurity testing, penetration testing, and authorized system management. It enables safe, controlled command execution and file transfers between machines for educational and defensive security purposes.
Secure shell command execution
File upload/download with logging
Designed for red teaming and penetration testing labs
Includes ethical use guidelines and safeguards
Change the IP4 variable to the attacker's IP in both server.py and backdoor.py files.
The server.py runs on the attacker's machine, waiting for a connection.
The backdoor.py runs on the victim's machine, connects to the server, and awaits commands.
The attacker sends commands (e.g., dir, ls, download secret.txt, upload malware.exe), and the victim executes them.
Open a text editor and change the IP address to the attacker's IP:
>> IP4 = 192.168.0.108 #change this
Connects to a server (192.168.x.x:5555) and waits for commands.
Executes received commands on the victim's machine and sends back the results.
Supports:
Running arbitrary shell commands.
Changing directories (cd).
Uploading files from the victim's machine to the attacker (download).
Downloading files from the attacker to the victim (upload).
Persistence (reconnects if the connection drops).
Listens on 192.168.x.x:5555 for incoming connections from the backdoor client.
Provides an interactive shell to send commands to the infected machine.
Supports:
Sending shell commands to the victim.
Uploading files to the victim (upload).
Downloading files from the victim (download).
Clearing the terminal (clear).
This is a malicious tool (a backdoor/RAT) that allows unauthorized remote control of a system.
It can be used for illegal activities (data theft, espionage, further malware deployment).
Detection methods:
Network monitoring (unexpected connections to 5555).
Antivirus scans (behavioral detection of suspicious subprocess execution).
Firewall rules are blocking unusual outbound traffic.
Do not use this for illegal purposes. Unauthorized access to systems is a crime.
For ethical hacking (penetration testing), ensure you have explicit permission before testing such tools.