Python License
FishShell can be used to manage/handle mutilple sessions with client Windows/Linux machines running the generated backdoor payload. This tool is handy for sharing a shell sessions for group projects or redteam testing.
Main idea behind this tool is to be used as basic a C2 framework for beginners and introduce or get acquainted to the basics of a C2 framwork.
⚡ This is an early release currently being tested.
Disclaimer: Running the backdoor payloads generated by this tool against hosts that you do not have explicit permission to test or to exploit someone is illegal. You are responsible for any trouble you get into by using this tool.
git clone https://github.com/TriDEntApollO/FIshShell.git
cd FishShell
pip install -r requiurements.txt
python fishshell.py
pip3 install -r requiurements.txt
python3 fishshell.py
Note: FishShell is prefered to be run as root or admin.
For more information on how to use FishShell and about the commands, enter 'help' in the FishShell terminal
- FishShell is still under developement.
- There may be some critical bugs in the tool, if you face any please issue a report.
- During a reverse shell session if any command is executed which propmts in an interactive shell or environment the reverse shell will freeze.
- Not as powerful as other C2 frameworks.
- Can change host and port the tool will listen on.
- Easy to use and understand.
- Generates backdoor payload that can run on low privilage users.
- New users & beginners can easily get on with the tool's features and usage helping them understand the C2 framework.