From efcdb7908686a060076321b0e339a5df13bedb43 Mon Sep 17 00:00:00 2001 From: Beyar Date: Fri, 11 May 2018 14:16:27 +0200 Subject: [PATCH 1/2] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 839d7fa..80b5f33 100644 --- a/README.md +++ b/README.md @@ -2,7 +2,7 @@ ## About Pop shells like a master Shell pop is all about popping shells. With this tool you can - generate easy and sofisticated reverse or bind shell commands + generate easy and sophisticated reverse or bind shell commands to help you during penetration tests. Don't waste more time with .txt files storing your Reverse shells! From 29b58cf1572f9d1cc88e37a7eca268c877e1d1d6 Mon Sep 17 00:00:00 2001 From: Touhid M Shaikh Date: Thu, 24 May 2018 13:29:11 +0530 Subject: [PATCH 2/2] exception update added handler exception to handle PORT already used and Keyboard exception --- bin/shellpop | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-) diff --git a/bin/shellpop b/bin/shellpop index 61a1e83..3db8e12 100644 --- a/bin/shellpop +++ b/bin/shellpop @@ -1,4 +1,4 @@ -#!/usr/bin/env python +#!/usr/bin/python # Description: # ShellPop is program to aid penetration testers # generating quick and dirty reverse/bind shell @@ -11,7 +11,7 @@ # =================================================== # LowFuel contributed to the project in 27/04/2018 # Github: https://github.com/SouAquele -# Touhid Shaik joined the project in 29/04/2018 +# Touhid Shaikh joined the project in 29/04/2018 # Github: https://github.com/touhidshaikh @@ -695,7 +695,14 @@ def main(): if shell.handler is not None and args.handler is True: print(info("Starting shell handler ...")) - shell.handler(shell.handler_args) + try: + shell.handler(shell.handler_args) + except KeyboardInterrupt: + print(info("Killing handler ...")) + sys.exit() + except IOError: + print(info("Port Already used by another Program or Something Wrong...")) + sys.exit() else: print(info("This shell DOES NOT have a handler set."))