During Internal penetration testing, sometimes you get an environment, where Antiviruses are up to date, which means that, you cannot use “fancy” shells to get a reverse shell as they get detected. Metasploit is obviously not an option here, as most (if not all) metasploit exploits and tools are flagged by Antiviruses as malicious.At that time you require , something very simple, that can evade the AntiViruses and also gets the job done. For that, i’m sharing a very simple Python reverse shell that is FUD (Fully undetectable) and gives the attacker shell access. This Simple Python Fully Undetectable (FUD) Reverse Shell Backdoor is written by guys at TrustedSec.
It will create a reverse connection on attacker’s machine listening for incoming connections on specified port.