File browser
A full filesystem browser lets you navigate, upload, download, and delete files directly from the browser.GET /api/files/list
List directory contents.GET /api/files/mounts
List available filesystem mount points (read from/proc/mounts). Used by the UI to populate the mount dropdown.
POST /api/files/upload
Upload a file to a directory.GET /api/files/download
Download a file by absolute path.DELETE /api/files/delete
Delete a file or directory (recursive for directories).POST /api/files/mkdir
Create a directory.HTTP server
Serves files over HTTP using Python’s built-inhttp.server module (python3 -m http.server). Use this to deliver payloads, tools, or scripts to target machines.
POST /api/httpserver/start
| Field | Default | Description |
|---|---|---|
port | 8080 | TCP port to listen on |
directory | ~ | Directory to serve |
POST /api/httpserver/stop
Terminates the HTTP server process.GET /api/httpserver/status
GET /api/httpserver/output
Stream server logs (access log output) incrementally.SMB server
Hosts an SMB share usingimpacket-smbserver with SMBv2 support. Useful for delivering payloads to Windows targets or catching NTLM authentication.
POST /api/smbserver/start
| Field | Default | Description |
|---|---|---|
share_name | share | SMB share name (e.g. \\attacker\tools) |
share_path | ~ | Local directory to expose |
username | “ | Optional authentication username |
password | “ | Optional authentication password |
-smb2support so modern Windows clients can connect. Leave username/password empty to allow unauthenticated access.
Response
POST /api/smbserver/stop
Terminates the SMB server process (viaSIGTERM to the process group).
GET /api/smbserver/status
GET /api/smbserver/output
Stream server connection logs incrementally.Netcat listener
Starts anc -lvnp <port> listener to catch reverse shell connections. The listener output is streamed live in the browser and also available via a WebSocket for interactive shell use.
POST /api/listener/start
| Field | Default | Description |
|---|---|---|
port | 4444 | TCP port to listen on |
POST /api/listener/stop
Terminates the netcat listener.GET /api/listener/status
GET /api/listener/output
Read listener output incrementally (from in-memory buffer).WebSocket: /ws/listener
Interactive WebSocket connection to the listener process. Proxies I/O bidirectionally between the browser and the ncat process stdin/stdout — enabling interactive shell sessions directly in the browser.Typical payload delivery workflow
Start the HTTP server
Open TOOLS → File Server → HTTP Server. Set the directory containing your payloads (e.g.
/home/user/payloads). Click Start.Start the listener
Open the Listener tab. Set the port your reverse shell will connect back to (e.g. 4444). Click Start.
Execute payload on target
From your shell access or exploit, trigger the payload download and execution:Or via SMB: