ShadowShell is a Python-based backdoor designed for cybersecurity professionals and penetration testers.
It provides a persistent, stealthy reverse shell, enabling secure remote command execution, file transfer, keylogging, screenshot capture, and system information gathering.
This tool is intended for authorized security assessments and educational purposes only.
✅ Reverse Shell – Execute remote commands on the target system.
✅ Persistence Mechanism – Ensures the backdoor runs after reboot (Windows).
✅ File Transfer (Upload & Download) – Move files between attacker and target.
✅ Screenshot Capture – Remotely take screenshots of the target’s screen.
✅ Keylogger – Capture keystrokes in the background.
✅ System Information Gathering – Get OS details, username, IP, and more.
✅ Stealth Mode – Runs undetected in the background.
✅ Improved Reliability – Enhanced exception handling for stability.
📦 ShadowShell
├── backdoor.py # Client-side (Target Machine) - Runs as a background process
├── server.py # Server-side (Attacker Machine) - Controls the backdoor
├── requirements.txt # Requirements File
├── README.md # Project documentation
git clone https://github.com/YourGitHubUsername/ShadowShell.git
cd ShadowShell
Ensure Python3 is installed. Install required dependencies:
pip install -r requirements.txt
Modify server.py
with your attacker IP and execute:
python server.py
Modify backdoor.py
with your server IP, then execute:
python backdoor.py
For Windows Persistence, compile it to an executable:
pyinstaller --onefile --noconsole backdoor.py
Command | Description |
---|---|
quit |
Terminate the connection |
clear |
Clear the attacker’s terminal |
cd <dir> |
Change directory on the target machine |
download <file> |
Download a file from the target |
upload <file> |
Upload a file to the target |
screenshot |
Capture and download the target’s screen |
sysinfo |
Retrieve OS, hostname, username, and IP details |
This tool is strictly for ethical hacking and authorized penetration testing.
The aim of this tool is for authorized security assessments and educational purposes only.
The author holds no responsibility for any unauthorized use of this tool.
Use ShadowShell responsibly and only with explicit permission from the target system owner.
Contributions, feature suggestions, and pull requests are welcome!
Feel free to fork and enhance ShadowShell with new capabilities.