Penelope
GPL-3.0๐ฅ Offensive Ops ยท Python
Penelope is an advanced shell handler designed to replace netcat as the go-to reverse shell listener during penetration tests. Written in Python with zero external dependencies, it automatically upgrades received shells to fully interactive PTYs with tab completion, history, and job control - eliminating the manual 'python -c import pty' dance. Penelope handles multiple simultaneous shell sessions with a clean interface for switching between them, provides built-in file upload and download without needing to set up separate transfer servers, automatically logs all session activity for reporting, and can generate reverse shell payloads for various platforms and languages. It supports encrypted shells, can spawn listeners on multiple ports, and includes a command history searchable across sessions.
Installation
pip
$ pip install penelope-shellfrom source
$ git clone https://github.com/brightio/penelope.git && cd penelope && python penelope.pyUse Cases
- Handling reverse shells with automatic PTY upgrade and interactive features
- Managing multiple simultaneous shell sessions during penetration tests
- Transferring files to and from compromised hosts without additional tools
- Generating reverse shell one-liners for various languages and platforms
- Logging all shell session activity automatically for engagement reporting
Tags
Details
- Category
- ๐ฅ Offensive Ops
- Language
- Python
- Repository
- brightio/penelope
- License
- GPL-3.0
- Platforms
- ๐งlinux๐macos
Links
Alternatives & Comparisons
More in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.