Hey HN!<p>Today I'd like to share what will hopefully be just the beginning of a collection of offensive security tools I write in Rust. I decided to give this a shot because I wanted to be able to generate my own reverse shells for CTFs and the like without needing to rely solely on 3rd party tools.<p>With a quick change to the config.rs file, you can compile a TCP reverse shell that will point back to your machine whether your target is running Linux or Windows. Linux uses Rust's std::process::Command while Windows uses the windows::Win32 APIs.<p>Over time I intend to create more tools that use this as a base. Some ideas include: a TCP reverse shell that performs process migration, an obfuscated version for circumventing antivirus, and a staged version. Would love to hear what you think about it!<p>Happy hacking