Metadata-Version: 2.4
Name: letstry
Version: 0.1.1
Summary: Toolkit for RCE testing, command execution, and file enumeration
Home-page: https://github.com/mukeshkumar-a
Author: Mukesh Kumar
Author-email: creatorsk549@gmail.com
Classifier: Programming Language :: Python :: 3
Classifier: Operating System :: OS Independent
Requires-Python: >=3.6
Description-Content-Type: text/markdown
License-File: LICENSE
Dynamic: author
Dynamic: author-email
Dynamic: classifier
Dynamic: description
Dynamic: description-content-type
Dynamic: home-page
Dynamic: license-file
Dynamic: requires-python
Dynamic: summary

# LetsTry

A powerful single-file Python toolkit for Remote Code Execution (RCE) testing, file and directory enumeration, and Linux command execution.

> 🚨 For educational and authorized testing purposes only.

---

## 🔧 Features

- ✅ List files, folders, and recursively enumerate directories
- ✅ Run Linux commands and capture output
- ✅ Execute system-level calls
- ✅ Use `glob`, `pathlib`, and `os` modules together
- ✅ Optional socket callback support for RCE testing

---

## 📦 Installation

```bash
pip install letstry
````

---

## 🚀 Usage

```python
import letstry

# Run Linux command
print(letstry.run_command("uname -a"))

# List all files in /etc
print(letstry.list_files("/etc"))

# Recursive listing using pathlib
print(letstry.scan_pathlib("/var/log"))

# Run a command using os.system
letstry.run_os_system("ls -l")

# Send a callback to a listener
letstry.send_callback("192.168.1.100", 4444, "Ping from exploited box")

# Host information
print(letstry.get_host_info())
```

---

## 📁 Module Functions

### 📂 File Enumeration

* `list_all(path=".")`
* `list_files(path=".")`
* `list_dirs(path=".")`
* `recursive_glob(path=".", pattern="*")`
* `scan_pathlib(path=".")`

### ⚙️ Command Execution

* `run_command(cmd)`
* `run_os_system(cmd)`
* `safe_eval(code)` (⚠️ Dangerous — use for test only)

### 🌐 Network Utilities

* `get_host_info()`
* `send_callback(ip, port, msg)`

---


## ⚠️ Disclaimer

This tool is intended **only for ethical hacking, penetration testing, or system administration on systems you have explicit permission to test**. Any misuse is strictly prohibited and the author assumes no responsibility for illegal usage.

---

````
