Skip to content

Instantly share code, notes, and snippets.

@leonjza
Last active July 30, 2023 16:28
Show Gist options
  • Star 70 You must be signed in to star a gist
  • Fork 22 You must be signed in to fork a gist
  • Save leonjza/f35a7252babdf77c8421 to your computer and use it in GitHub Desktop.
Save leonjza/f35a7252babdf77c8421 to your computer and use it in GitHub Desktop.
Python Netcat
import socket
class Netcat:
""" Python 'netcat like' module """
def __init__(self, ip, port):
self.buff = ""
self.socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
self.socket.connect((ip, port))
def read(self, length = 1024):
""" Read 1024 bytes off the socket """
return self.socket.recv(length)
def read_until(self, data):
""" Read data into the buffer until we have data """
while not data in self.buff:
self.buff += self.socket.recv(1024)
pos = self.buff.find(data)
rval = self.buff[:pos + len(data)]
self.buff = self.buff[pos + len(data):]
return rval
def write(self, data):
self.socket.send(data)
def close(self):
self.socket.close()
# below is a extract from a sample exploit that
# interfaces with a tcp socket
from netcat import Netcat
# start a new Netcat() instance
nc = Netcat('127.0.0.1', 53121)
# get to the prompt
nc.read_until('>')
# start a new note
nc.write('new' + '\n')
nc.read_until('>')
# set note 0 with the payload
nc.write('set' + '\n')
nc.read_until('id:')
@iamabhi747
Copy link

@brenw0rth exactly what I need, thanks:)

@bw0rth
Copy link

bw0rth commented Mar 7, 2023

@brenw0rth exactly what I need, thanks:)

You're welcome :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment