Skip to content

Instantly share code, notes, and snippets.

@marceloalmeida
Forked from leonjza/netcat.py
Created September 18, 2018 08:52
Show Gist options
  • Save marceloalmeida/ca5c0aefd6f741413139161ba24a9717 to your computer and use it in GitHub Desktop.
Save marceloalmeida/ca5c0aefd6f741413139161ba24a9717 to your computer and use it in GitHub Desktop.
Python Netcat
import socket
class Netcat:
""" Python 'netcat like' module """
def __init__(self, ip, port):
self.buff = ""
self.socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
self.socket.connect((ip, port))
def read(self, length = 1024):
""" Read 1024 bytes off the socket """
return self.socket.recv(length)
def read_until(self, data):
""" Read data into the buffer until we have data """
while not data in self.buff:
self.buff += self.socket.recv(1024)
pos = self.buff.find(data)
rval = self.buff[:pos + len(data)]
self.buff = self.buff[pos + len(data):]
return rval
def write(self, data):
self.socket.send(data)
def close(self):
self.socket.close()
# below is a extract from a sample exploit that
# interfaces with a tcp socket
from netcat import Netcat
# start a new Netcat() instance
nc = Netcat('127.0.0.1', 53121)
# get to the prompt
nc.read_until('>')
# start a new note
nc.write('new' + '\n')
nc.read_until('>')
# set note 0 with the payload
nc.write('set' + '\n')
nc.read_until('id:')
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment