Reverse shell written in Python. The server will be listening on victim machine for incoming connection.
For Windows machine, use _winrag module to edit Registry therefore you can add auto run key with fake procress name. For *nix machines, there is a directory called /etc/init.d which is similar to Windows Registry
Password authenticating to access server therefore server will accept the connection only if the password provided by attacker console is valid.
Features: Upload scripts for further attacks such as gaining Admin access or use as bot for DDOS. Download datas. use 'exit' to disconnect and you can reconnect easily. For commands in detials, type 'help' in console.
Usage for console: python console.py ip port password.
Bind server.py with legitimate program and send it to victim. You can actually just give server.py and told to run it.